INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df911d84 r8:00000002 r7:60000013 r6:df911d8c r5:833aa400 r4:833aa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833aa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d0340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f2bd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d038c r4:857d0000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d038c r4:83363680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833aa400 r8:833636ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83363680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027ed34 r7:df845e60 r6:83363700 r5:833aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8335ffc0 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/1:2:724 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:724 tgid:724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e01f1d84 r8:00000002 r7:60000113 r6:e01f1d8c r5:83b16c00 r4:83b16c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b16c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567978c r4:85679400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567978c r4:83c5eb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b16c00 r8:83c5eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83c5eb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c5eb00 r8:8027ed34 r7:df951e60 r6:83b5ea80 r5:83b16c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01f1fb0 to 0xe01f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83c40700 INFO: task kworker/1:2:724 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/1:3:2880 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:2880 tgid:2880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec789d84 r8:00000002 r7:60000113 r6:ec789d8c r5:842b3000 r4:842b3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842b3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc8f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85679b8c r4:85679800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85679b8c r4:8436d180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842b3000 r8:8436d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8436d180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8436d180 r8:8027ed34 r7:df951e60 r6:8436d200 r5:842b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8436ae00 INFO: task kworker/1:3:2880 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/1:0:3103 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3103 tgid:3103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df97dd84 r8:00000002 r7:60000113 r6:df97dd8c r5:832ee000 r4:832ee000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832ee000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853def80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535ab8c r4:8535a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535ab8c r4:84d1fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ee000 r8:84d1fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d1fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d1fc00 r8:8027ed34 r7:ec789e60 r6:84d1f700 r5:832ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf97dfb0 to 0xdf97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d5bf40 INFO: task kworker/1:0:3103 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/0:10:3124 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa19d84 r8:00000002 r7:60000013 r6:dfa19d8c r5:832eec00 r4:832eec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832eec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1c740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49cd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f838c r4:850f8000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f838c r4:84da1800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832eec00 r8:84da182c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1800 r8:8027ed34 r7:df9ede60 r6:84d1f500 r5:832eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da4a40 INFO: task kworker/0:10:3124 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/0:11:3126 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:832ebc00 r4:832ebc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832ebc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d44880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e088f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d6b8c r4:850d6800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d6b8c r4:84da1880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ebc00 r8:84da18ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1880 r8:8027ed34 r7:dfa19e60 r6:84d1f680 r5:832ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da4b80 INFO: task kworker/0:11:3126 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/0:12:3127 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:844d3000 r4:844d3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c0a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0055000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d638c r4:850d6000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d638c r4:84da1900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d3000 r8:84da192c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1900 r8:8027ed34 r7:dfa21e60 r6:84da1980 r5:844d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da4b80 INFO: task kworker/0:12:3127 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/0:13:3130 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:844d3c00 r4:844d3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851356c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d7b8c r4:850d7800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d7b8c r4:84da1a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d3c00 r8:84da1a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1a00 r8:8027ed34 r7:dfa21e60 r6:84da1a80 r5:844d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da4e00 INFO: task kworker/0:13:3130 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/0:14:3132 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:844d0000 r4:844d0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d41640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01c5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523538c r4:85235000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8523538c r4:84da1b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0000 r8:84da1b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1b00 r8:8027ed34 r7:dfa1de60 r6:84da1b80 r5:844d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbf200 INFO: task kworker/0:14:3132 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/0:15:3134 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:844d2400 r4:844d2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d81a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523678c r4:85236400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8523678c r4:84da1c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d2400 r8:84da1c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1c00 r8:8027ed34 r7:df9d5e60 r6:84da1c80 r5:844d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbf180 INFO: task kworker/0:15:3134 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3137 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:844d4800 r4:844d4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a3b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85252f8c r4:85252c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85252f8c r4:84da1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d4800 r8:84da1d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1d00 r8:8027ed34 r7:dfa2de60 r6:84da1d80 r5:844d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbf240 INFO: task kworker/0:16:3137 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3138 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa55d84 r8:00000002 r7:60000013 r6:dfa55d8c r5:844d6000 r4:844d6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b0cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84541b8c r4:84541800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84541b8c r4:84da1e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6000 r8:84da1e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1e00 r8:8027ed34 r7:dfa49e60 r6:84da1e80 r5:844d6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbf240 INFO: task kworker/0:17:3138 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3140 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83a9b000 r4:83a9b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a9b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85198ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa2f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85348f8c r4:85348c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85348f8c r4:84da1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9b000 r8:84da1f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1f00 r8:8027ed34 r7:dfa55e60 r6:84da1f80 r5:83a9b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbf680 INFO: task kworker/0:18:3140 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3141 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:83a9e000 r4:83a9e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a9e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d8580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853bfb8c r4:853bf800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853bfb8c r4:84da1180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9e000 r8:84da11ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1180 r8:8027ed34 r7:dfa55e60 r6:84da1000 r5:83a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbf7c0 INFO: task kworker/0:19:3141 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1:3144 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:83a98000 r4:83a98000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a98000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f79c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a98000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535bf8c r4:8535bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535bf8c r4:84d1f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a98000 r8:84d1f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d1f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d1f180 r8:8027ed34 r7:ec789e60 r6:84d1fe80 r5:83a98000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db7ac0 INFO: task kworker/1:1:3144 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 83f50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3146 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa6dd84 r8:00000002 r7:60000013 r6:dfa6dd8c r5:832e9800 r4:832e9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832e9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e48840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546d78c r4:8546d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546d78c r4:84d1fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e9800 r8:84d1fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d1fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d1fe00 r8:8027ed34 r7:ec789e60 r6:830cd100 r5:832e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db7ac0 INFO: task kworker/1:4:3146 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3147 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:832ec800 r4:832ec800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832ec800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527ab80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c4f8c r4:854c4c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c4f8c r4:84da1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ec800 r8:84da112c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1100 r8:8027ed34 r7:dfa79e60 r6:830cd080 r5:832ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbfc40 INFO: task kworker/0:20:3147 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3148 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:832ed400 r4:832ed400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832ed400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f0c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c8f8c r4:853c8c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c8f8c r4:84d1fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ed400 r8:84d1fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d1fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d1fc80 r8:8027ed34 r7:dfa85e60 r6:83358380 r5:832ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbfb80 INFO: task kworker/0:21:3148 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3152 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:832e8000 r4:832e8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832e8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb39000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567938c r4:85679000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567938c r4:83358300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e8000 r8:8335832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83358300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358300 r8:8027ed34 r7:ec789e60 r6:83c43580 r5:832e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db7d00 INFO: task kworker/1:5:3152 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3154 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:83306000 r4:83306000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83306000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559fb40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83306000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c5b8c r4:854c5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c5b8c r4:8419c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83306000 r8:8419c5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8419c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419c580 r8:8027ed34 r7:dfa85e60 r6:83349800 r5:83306000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbffc0 INFO: task kworker/0:22:3154 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3156 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfacdd84 r8:00000002 r7:60000013 r6:dfacdd8c r5:83302400 r4:83302400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83302400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b74c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83302400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c7b8c r4:854c7800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c7b8c r4:83349880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83302400 r8:833498ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83349880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349880 r8:8027ed34 r7:dfac1e60 r6:830b8580 r5:83302400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc100 INFO: task kworker/0:23:3156 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3158 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:83301800 r4:83301800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83301800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e29c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83301800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c6b8c r4:854c6800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c6b8c r4:830b8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83301800 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ed34 r7:dfacde60 r6:84d49f80 r5:83301800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc280 INFO: task kworker/0:24:3158 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3160 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:83303000 r4:83303000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83303000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fab80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83303000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb735000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8454378c r4:84543400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8454378c r4:84d49700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83303000 r8:84d4972c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d49700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d49700 r8:8027ed34 r7:dfacde60 r6:84d49600 r5:83303000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc480 INFO: task kworker/0:25:3160 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3162 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83303c00 r4:83303c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83303c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83303c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84543b8c r4:84543800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84543b8c r4:84dc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83303c00 r8:84dc102c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1000 r8:8027ed34 r7:dfab5e60 r6:84dc1080 r5:83303c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc5c0 INFO: task kworker/0:26:3162 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3164 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:83a82400 r4:83a82400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a82400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a82400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85628b8c r4:85628800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85628b8c r4:84dc1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a82400 r8:84dc112c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1100 r8:8027ed34 r7:dfae5e60 r6:83c43500 r5:83a82400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc700 INFO: task kworker/0:27:3164 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3166 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:83a80000 r4:83a80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a80000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbc9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562878c r4:85628400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562878c r4:84dc1180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a80000 r8:84dc11ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1180 r8:8027ed34 r7:dfb09e60 r6:832a1180 r5:83a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbca40 INFO: task kworker/0:28:3166 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3168 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83305400 r4:83305400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83305400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85737440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83305400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb257000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85629b8c r4:85629800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85629b8c r4:84dc1200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83305400 r8:84dc122c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1200 r8:8027ed34 r7:dfb19e60 r6:84dc1280 r5:83305400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc900 INFO: task kworker/0:29:3168 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3170 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83a9a400 r4:83a9a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a9a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85737940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead23000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85629f8c r4:85629c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85629f8c r4:84dc1300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9a400 r8:84dc132c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1300 r8:8027ed34 r7:dfaf1e60 r6:84dc1380 r5:83a9a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc900 INFO: task kworker/0:30:3170 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3171 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb29d84 r8:00000002 r7:60000013 r6:dfb29d8c r5:842b1800 r4:842b1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842b1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855703c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc09000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562af8c r4:8562ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562af8c r4:84dc1480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842b1800 r8:84dc14ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1480 r8:8027ed34 r7:dfafde60 r6:84dc1500 r5:842b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbcd00 INFO: task kworker/0:31:3171 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3172 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:833a8c00 r4:833a8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833a8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f165000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562ab8c r4:8562a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562ab8c r4:84dc1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a8c00 r8:84dc15ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1580 r8:8027ed34 r7:dfb29e60 r6:84dc1600 r5:833a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbcd00 INFO: task kworker/0:32:3172 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3176 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb1dd84 r8:00000002 r7:60000013 r6:dfb1dd8c r5:84028c00 r4:84028c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84028c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84028c00 r7:00000000 r6:83018000 r5:00001000 r4:7f163000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562a78c r4:8562a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562a78c r4:84dc1680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84028c00 r8:84dc16ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1680 r8:8027ed34 r7:dfb35e60 r6:84dc1700 r5:84028c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f1f100 INFO: task kworker/0:33:3176 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3178 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:84029800 r4:84029800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84029800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ae00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84029800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cf78c r4:857cf400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857cf78c r4:84dc1780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84029800 r8:84dc17ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1780 r8:8027ed34 r7:dfb1de60 r6:84dc1800 r5:84029800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f1f380 INFO: task kworker/0:34:3178 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3182 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:842a5400 r4:842a5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85679f8c r4:85679c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85679f8c r4:832a1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a5400 r8:832a112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1100 r8:8027ed34 r7:ec789e60 r6:84dc1880 r5:842a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26240 INFO: task kworker/1:6:3182 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3184 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb75d84 r8:00000002 r7:60000013 r6:dfb75d8c r5:842a3c00 r4:842a3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd0f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567ab8c r4:8567a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567ab8c r4:832a1080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a3c00 r8:832a10ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1080 r8:8027ed34 r7:dfb65e60 r6:84dc1900 r5:842a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26380 INFO: task kworker/1:7:3184 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3185 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:842a0000 r4:842a0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcc3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567a38c r4:8567a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567a38c r4:832a1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a0000 r8:832a142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1400 r8:8027ed34 r7:dfb75e60 r6:84dc1980 r5:842a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26380 INFO: task kworker/1:8:3185 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3187 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:842a6c00 r4:842a6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567a78c r4:8567a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567a78c r4:832a1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a6c00 r8:832a102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1000 r8:8027ed34 r7:dfb75e60 r6:84dc1a00 r5:842a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26540 INFO: task kworker/1:9:3187 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3189 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:842a3000 r4:842a3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc5440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4278c r4:85c42400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c4278c r4:84dc1a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a3000 r8:84dc1aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1a80 r8:8027ed34 r7:dfb4de60 r6:84dc1b00 r5:842a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f1fa40 INFO: task kworker/0:35:3189 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3191 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:832f3000 r4:832f3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567af8c r4:8567ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567af8c r4:832a1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f3000 r8:832a13ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1380 r8:8027ed34 r7:dfb75e60 r6:84368f80 r5:832f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26780 INFO: task kworker/1:10:3191 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3194 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:832f2400 r4:832f2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd3d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567b38c r4:8567b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567b38c r4:84368e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f2400 r8:84368e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84368e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84368e00 r8:8027ed34 r7:dfb59e60 r6:84dc6000 r5:832f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26840 INFO: task kworker/1:11:3194 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3195 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:832f0000 r4:832f0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526aa40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd4f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567b78c r4:8567b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567b78c r4:84dc6080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f0000 r8:84dc60ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6080 r8:8027ed34 r7:dfb95e60 r6:84dc6100 r5:832f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26840 INFO: task kworker/1:12:3195 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3198 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:842b0c00 r4:842b0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842b0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ad80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd8f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574038c r4:85740000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574038c r4:84dc6180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842b0c00 r8:84dc61ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6180 r8:8027ed34 r7:dfb41e60 r6:84dc6200 r5:842b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26c40 INFO: task kworker/1:13:3198 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3199 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:8324a400 r4:8324a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ab40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd6b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567bb8c r4:8567b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567bb8c r4:84dc6280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:84dc62ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6280 r8:8027ed34 r7:dfbb1e60 r6:84dc6300 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26c40 INFO: task kworker/1:14:3199 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3201 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:83a81800 r4:83a81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a81800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ac40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567bf8c r4:8567bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567bf8c r4:84dc6380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a81800 r8:84dc63ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6380 r8:8027ed34 r7:dfbb1e60 r6:84dc6400 r5:83a81800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26f00 INFO: task kworker/1:15:3201 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3203 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:8386ec00 r4:8386ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8386ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ae40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8386ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf4b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574078c r4:85740400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574078c r4:84dc6480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8386ec00 r8:84dc64ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6480 r8:8027ed34 r7:dfbb1e60 r6:84dc6500 r5:8386ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc5080 INFO: task kworker/1:16:3203 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3205 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbedd84 r8:00000002 r7:60000013 r6:dfbedd8c r5:8386d400 r4:8386d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8386d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8386d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf65000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85740f8c r4:85740c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85740f8c r4:84dc6580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8386d400 r8:84dc65ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6580 r8:8027ed34 r7:dfbe1e60 r6:84dc6600 r5:8386d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc5180 INFO: task kworker/1:17:3205 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3207 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:84ee8000 r4:84ee8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ee8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf71000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574138c r4:85741000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574138c r4:84dc6680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee8000 r8:84dc66ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6680 r8:8027ed34 r7:dfbede60 r6:84dc6700 r5:84ee8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc54c0 INFO: task kworker/1:18:3207 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3210 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84ee8c00 r4:84ee8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ee8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ee8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574178c r4:85741400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574178c r4:84dc6780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee8c00 r8:84dc67ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6780 r8:8027ed34 r7:dfbf9e60 r6:84dc6800 r5:84ee8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc55c0 INFO: task kworker/1:19:3210 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3211 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbc9d84 r8:00000002 r7:60000013 r6:dfbc9d8c r5:84ee9800 r4:84ee9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ee9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84f1f580 INFO: task kworker/0:36:3211 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:20 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eea400 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85741f8c r4:85741c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85741f8c r4:84dc6900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eea400 r8:84dc692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:85e9178c r4:85e91400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3217 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:84eeb000 r4:84eeb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eeb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eeb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:22 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84dc6b00 r8:8027ed34 r7:dfc45e60 r6:84dc6b80 r5:84eebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc5780 INFO: task kworker/1:22:3218 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84dc6c00 Exception stack(0xdfc55fb0 to 0xdfc55ff8) r4:84dc5c00 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:37 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84eee000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eee000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ac40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84eee000 r7:00000000 r6:83018000 r5:00001000 r4:7f327000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc99000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cef8c r4:857cec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857cef8c r4:84dc1c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eee000 r8:84dc1c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1c00 r8:8027ed34 r7:dfb4de60 r6:84dc6d00 r5:84eee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f1f240 INFO: task kworker/0:37:3221 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r5:80070013 r4:80239bd0 r4:00000000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84eeec00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) r4:84db7540 r5:80070013 r4:80239bd0 r5:00001000 r4:edc47000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:25 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ecb40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ef0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85743b8c r4:85743800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85743b8c r4:84dc6e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef0c00 r8:84dc6eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6e80 r8:8027ed34 r7:dfc55e60 r6:84dc6f00 r5:84ef0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9e380 INFO: task kworker/1:25:3224 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:26 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ef1800 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574338c r4:85743000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574338c r4:84dc6f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef1800 r8:84dc6fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dc6f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc6f80 r8:8027ed34 r7:dfc55e60 r6:84dae000 r5:84ef1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9e4c0 INFO: task kworker/1:26:3228 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:27:3229 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r4:84ef2400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ecd40 r4:00000000 r9:83018205 r8:84ef2400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574438c r4:85744000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574438c r4:84dae080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef2400 r8:84dae0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dae080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dae080 r8:8027ed34 r7:dfc31e60 r6:84dae100 r5:84ef2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9e540 INFO: task kworker/1:27:3229 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3230 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:84ef3000 r4:84ef3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ef3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ef3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85742f8c r4:85742c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85742f8c r4:84dae180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef3000 r8:84dae1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dae180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dae180 r8:8027ed34 r7:dfc25e60 r6:84dae200 r5:84ef3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9e540 INFO: task kworker/1:28:3230 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3233 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc7dd84 r8:00000002 r7:60000013 r6:dfc7dd8c r5:84ef3c00 r4:84ef3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ef3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ecac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ef3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb541000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85744f8c r4:85744c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85744f8c r4:84dae280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef3c00 r8:84dae2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dae280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dae280 r8:8027ed34 r7:dfc25e60 r6:84dae300 r5:84ef3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9e940 INFO: task kworker/1:29:3233 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3235 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfca1d84 r8:00000002 r7:60000013 r6:dfca1d8c r5:84ef4800 r4:84ef4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ef4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 5d60: 80070013 ffffffff r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3237 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:84ef5400 r4:84ef5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ef5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855786c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ef5400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba55000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85746b8c r4:85746800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85746b8c r4:84dae500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef5400 r8:84dae52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dae500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dae500 r8:8027ed34 r7:dfca1e60 r6:84dae580 r5:84ef5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9ebc0 INFO: task kworker/1:31:3237 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3238 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc95d84 r8:00000002 r7:60000013 r6:dfc95d8c r5:84ef6000 r4:84ef6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ef6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ef6000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb97f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574578c r4:85745400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574578c r4:84dae600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef6000 r8:84dae62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dae600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dae600 r8:8027ed34 r7:dfcade60 r6:84dae680 r5:84ef6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9ebc0 INFO: task kworker/1:32:3238 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3241 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eba1d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3243 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcddd84 r8:00000002 r7:60000013 r6:dfcddd8c r5:84eed400 r4:84eed400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eed400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558aec0 r9:83018005 r8:84eed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 r10:61c88647 r9:84eed400 r8:84dc1cac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9c400 INFO: task kworker/0:38:3243 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3245 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:857d0b8c r4:84dc1d00 Exception stack(0xdfcedfb0 to 0xdfcedff8) r4:84d9c480 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:40 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84ef9800 r5:84ef9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567f080 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ef9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2bf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d078c r4:857d0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d078c r4:84dc1d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef9800 r8:84dc1dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1d80 r8:8027ed34 r7:dfcede60 r6:84dae900 r5:84ef9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9c480 INFO: task kworker/0:40:3246 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3248 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:84ef8000 r4:84ef8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ef8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578380 r9:83018205 r8:84ef8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:85745f8c r4:84dae980 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84daa000 INFO: task kworker/1:34:3248 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:84efb000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84efb000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r10:61c88647 r9:84efb000 r8:84daeaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3253 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:84efbc00 r4:84efbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84efbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84efbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574738c r4:85747000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574738c r4:84daeb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84efbc00 r8:84daebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84daeb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84daeb80 r8:8027ed34 r7:dfcade60 r6:84daec00 r5:84efbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84daa580 INFO: task kworker/1:36:3253 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3255 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd19d84 r8:00000002 r7:60000113 r6:dfd19d8c r5:84efc800 r4:84efc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84efc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84efc800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562978c r4:85629400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8562978c r4:84daec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84efc800 r8:84daecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84daec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84d84680 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:38 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84efd400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574778c r4:85747400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574778c r4:84daed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84efd400 r8:84daedac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84daed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84daed80 r8:8027ed34 r7:dfd19e60 r6:84daee00 r5:84efd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84daa800 INFO: task kworker/1:38:3257 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84411000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:39 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84efe000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc29000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85747f8c r4:85747c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85747f8c r4:84daee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84efe000 r8:84daeeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84daee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84daee80 r8:8027ed34 r7:dfd25e60 r6:84daef00 r5:84efe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd31fb0 to 0xdfd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84daaa80 INFO: task kworker/1:39:3261 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3262 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfccdd84 r8:00000002 r7:60000113 r6:dfccdd8c r5:84efec00 r4:84efec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84efec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fffc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84efec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8574cf8c r4:8574cc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84daef80 r8:8027ed34 r7:dfd31e60 r6:84d8f000 r5:84efec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84daaa80 INFO: task kworker/1:40:3262 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84efa400 r4:84efa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84efa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ad600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84efa400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb767000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574eb8c r4:8574e800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574eb8c r4:84d8f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84efa400 r8:84d8f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) r4:84daaa80 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3266 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:84ef0000 r4:84ef0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ef0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ef0000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed37f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d0f8c r4:857d0c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d0f8c r4:84dc1e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef0000 r8:84dc1e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1e00 r8:8027ed34 r7:dfcede60 r6:84d8f180 r5:84ef0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9cc80 INFO: task kworker/0:41:3266 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3267 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:84f00000 r4:84f00000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f00000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f00000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed439000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d138c r4:857d1000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d138c r4:84dc1e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f00000 r8:84dc1eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1e80 r8:8027ed34 r7:dfa29e60 r6:84d8f200 r5:84f00000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9cc80 INFO: task kworker/0:42:3267 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3269 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:84f00c00 r4:84f00c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f00c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2ef000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed61d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d1b8c r4:857d1800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d1b8c r4:84dc1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f00c00 r8:84dc1f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1f00 r8:8027ed34 r7:dfa45e60 r6:84d8f280 r5:84f00c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9cc40 INFO: task kworker/0:43:3269 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3271 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:84f01800 r4:84f01800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f01800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f01800 r7:00000000 r6:83018000 r5:00001000 r4:7f2f1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed679000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d1f8c r4:857d1c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d1f8c r4:84dc1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f01800 r8:84dc1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dc1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dc1f80 r8:8027ed34 r7:dfa51e60 r6:84d8f300 r5:84f01800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9cfc0 INFO: task kworker/0:44:3271 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3273 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa69d84 r8:00000002 r7:60000013 r6:dfa69d8c r5:84f02400 r4:84f02400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f02400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f02400 r7:00000000 r6:83018000 r5:00001000 r4:7f307000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edacd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d438c r4:857d4000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d438c r4:84211000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f02400 r8:8421102c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211000 r8:8027ed34 r7:dfa5de60 r6:84d8f380 r5:84f02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9cf40 INFO: task kworker/0:45:3273 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3275 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa81d84 r8:00000002 r7:60000013 r6:dfa81d8c r5:84f03000 r4:84f03000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f03000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f03000 r7:00000000 r6:83018000 r5:00001000 r4:7f2f5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d278c r4:857d2400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d278c r4:84211080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f03000 r8:842110ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84211080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211080 r8:8027ed34 r7:dfa69e60 r6:84d8f400 r5:84f03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84396000 INFO: task kworker/0:46:3275 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3278 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9c5d84 r8:00000002 r7:60000013 r6:df9c5d8c r5:842a0c00 r4:842a0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f305000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaa5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d3f8c r4:857d3c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d3f8c r4:84211100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a0c00 r8:8421112c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211100 r8:8027ed34 r7:dfa69e60 r6:84211180 r5:842a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84396140 INFO: task kworker/0:47:3278 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3281 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfabdd84 r8:00000002 r7:60000013 r6:dfabdd8c r5:842a1800 r4:842a1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f303000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda8d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d3b8c r4:857d3800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d3b8c r4:84211200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a1800 r8:8421122c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211200 r8:8027ed34 r7:df9c5e60 r6:84211280 r5:842a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84396280 INFO: task kworker/0:48:3281 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3282 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:842a6000 r4:842a6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588e80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f2fd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d338c r4:857d3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d338c r4:84211300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a6000 r8:8421132c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211300 r8:8027ed34 r7:dfabde60 r6:84211380 r5:842a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84396280 INFO: task kworker/0:49:3282 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3283 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaedd84 r8:00000002 r7:60000013 r6:dfaedd8c r5:842a4800 r4:842a4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842a4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588f40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f301000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda7d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d378c r4:857d3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d378c r4:84211400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a4800 r8:8421142c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211400 r8:8027ed34 r7:dfa8de60 r6:84211480 r5:842a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84396680 INFO: task kworker/0:50:3283 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3286 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb15d84 r8:00000002 r7:60000013 r6:dfb15d8c r5:84f05400 r4:84f05400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f05400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f05400 r7:00000000 r6:83018000 r5:00001000 r4:7f2f9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed859000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d2f8c r4:857d2c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d2f8c r4:84211500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f05400 r8:8421152c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211500 r8:8027ed34 r7:dfa8de60 r6:84d8f480 r5:84f05400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84396800 INFO: task kworker/0:51:3286 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3289 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb3dd84 r8:00000002 r7:60000013 r6:dfb3dd8c r5:84f06000 r4:84f06000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f06000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f06000 r7:00000000 r6:83018000 r5:00001000 r4:7f2f7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed805000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d2b8c r4:857d2800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d2b8c r4:84211600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f06000 r8:8421162c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211600 r8:8027ed34 r7:dfb25e60 r6:84d8f580 r5:84f06000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84396c40 INFO: task kworker/0:53:3289 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3291 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:84f06c00 r4:84f06c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f06c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558af40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f309000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edae9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d478c r4:857d4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d478c r4:84211680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f06c00 r8:842116ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84211680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211680 r8:8027ed34 r7:dfb25e60 r6:84d8f600 r5:84f06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:843968c0 INFO: task kworker/0:54:3291 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3295 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:84f08c00 r4:84f08c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f08c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ffec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574cb8c r4:8574c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574cb8c r4:84d8f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f08c00 r8:84d8f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d8f680 r8:8027ed34 r7:dfccde60 r6:84d8f700 r5:84f08c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9aa40 INFO: task kworker/1:42:3295 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3297 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:84f08000 r4:84f08000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f08000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ad400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f08000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ab000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574e38c r4:8574e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574e38c r4:84d8f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f08000 r8:84d8f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d8f780 r8:8027ed34 r7:dfaf9e60 r6:84d8f800 r5:84f08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9a940 INFO: task kworker/1:43:3297 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3298 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3298 tgid:3298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:84c50000 r4:84c50000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c50000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ad500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c50000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574e78c r4:8574e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574e78c r4:84d8f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c50000 r8:84d8f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d8f880 r8:8027ed34 r7:dfb6de60 r6:84211700 r5:84c50000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9ae40 INFO: task kworker/1:44:3298 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3301 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84c51800 r4:84c51800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c51800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ad280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c51800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574df8c r4:8574dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574df8c r4:84d8f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c51800 r8:84d8f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d8f900 r8:8027ed34 r7:dfb6de60 r6:84211780 r5:84c51800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9ad00 INFO: task kworker/1:45:3301 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3303 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3303 tgid:3303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:84c52400 r4:84c52400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c52400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ad040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c52400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574db8c r4:8574d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574db8c r4:84d8f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c52400 r8:84d8f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d8f980 r8:8027ed34 r7:dfb8de60 r6:84211800 r5:84c52400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d9a4c0 INFO: task kworker/1:46:3303 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3305 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3305 tgid:3305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:84c53c00 r4:84c53c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c53c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268180 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574d38c r4:8574d000 r7:ddde2d40 r6:83018200 r5:8574d38c r4:84d8fa00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3307 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3307 tgid:3307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:84f0b000 r4:84f0b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f0b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fff80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574d78c r4:8574d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574d78c r4:84d8fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f0b000 r8:84d8faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d8fa80 r8:8027ed34 r7:dfbd1e60 r6:84d8fb00 r5:84f0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da0340 INFO: task kworker/1:48:3307 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:49:3309 blocked for more than 451 seconds. r4:84f09800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da0200 INFO: task kworker/1:49:3309 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3311 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3311 tgid:3311 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:8574ef8c r4:8574ec00 r10:00000000 r9:84d8fc80 r8:8027ed34 r7:dfbe9e60 r6:84d8fd00 r5:84f0bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:51 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d8fd80 r8:8027ed34 r7:dfbe9e60 r6:84d8fe00 r5:84f0c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da0600 INFO: task kworker/1:51:3313 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:52:3316 blocked for more than 451 seconds. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578a80 r10:61c88647 r9:84f0d400 r8:84d8feac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ffc80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec827000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574c38c r4:8574c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574c38c r4:84d8ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f0e000 r8:84d8ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d8ff80 r8:8027ed34 r7:dfc41e60 r6:84d7c000 r5:84f0e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da0a40 INFO: task kworker/1:53:3317 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ffb80 r10:61c88647 r9:84f0ec00 r8:84d7c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:55 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ffac0 r7:ddde2d40 r6:83018200 r5:8574bb8c r4:84d7c180 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3324 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3324 tgid:3324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:84f03c00 r4:84f03c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f03c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec803000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574b78c r4:8574b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574b78c r4:84d7c280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f03c00 r8:84d7c2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7c280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7c280 r8:8027ed34 r7:dfc79e60 r6:84d7c300 r5:84f03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da0c00 INFO: task kworker/1:56:3324 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f10000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574b38c r4:8574b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574b38c r4:84d7c380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f10000 r8:84d7c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7c380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7c380 r8:8027ed34 r7:dfca9e60 r6:84d7c400 r5:84f10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc91fb0 to 0xdfc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da0e00 INFO: task kworker/1:57:3325 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3328 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:8574af8c r4:8574ac00 r10:00000000 r9:84d7c480 r8:8027ed34 r7:dfc91e60 r6:84d7c500 r5:84f10c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:59:3329 blocked for more than 452 seconds. r5:84f11800 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3331 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3331 tgid:3331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:84f12400 r4:84f12400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f12400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff5c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f12400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8574a78c r4:84d7c680 Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) r4:841ea240 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 task:kworker/1:61 state:D stack:0 pid:3333 tgid:3333 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) r4:841ea540 Call trace: 5d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:62 state:D stack:0 pid:3335 tgid:3335 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd21e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85749f8c r4:84d7c880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f13c00 r8:84d7c8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7c880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7c880 r8:8027ed34 r7:dfd0de60 r6:84d7c900 r5:84f13c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd21fb0 to 0xdfd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841ea480 INFO: task kworker/1:62:3335 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d7c980 r8:8027ed34 r7:dfd21e60 r6:84d7ca00 r5:84f14800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f15400 r7:00000000 r6:83018200 r5:00001000 r4:7f121000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575c38c r4:8575c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575c38c r4:84d7ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f15400 r8:84d7caac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7ca80 r8:8027ed34 r7:dfd35e60 r6:84d7cb00 r5:84f15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841ea740 INFO: task kworker/1:64:3339 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:3341 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:3341 tgid:3341 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff0c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574978c r4:85749400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574978c r4:84d7cb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f16c00 r8:84d7cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7cb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7cb80 r8:8027ed34 r7:dfd3de60 r6:84d7cc00 r5:84f16c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd55fb0 to 0xdfd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841ea980 INFO: task kworker/1:65:3341 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 task:kworker/1:66 state:D stack:0 pid:3342 tgid:3342 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb73d000 r10:61c88647 r9:84f90c00 r8:84d7ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:55 state:D stack:0 pid:3344 tgid:3344 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84f92400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d4b8c r4:857d4800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d4b8c r4:84211900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f92400 r8:8421192c r7:82804d40 r6:dddced40 r5:dddced60 r4:84211900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211900 r8:8027ed34 r7:dfb25e60 r6:84d7cd80 r5:84f92400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d8be40 INFO: task kworker/0:55:3344 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3346 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3346 tgid:3346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd85d84 r8:00000002 r7:60000013 r6:dfd85d8c r5:84f93000 r4:84f93000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f93000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ecb300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f93000 r7:00000000 r6:83018000 r5:00001000 r4:7f30d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb25000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d4f8c r4:857d4c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d4f8c r4:84211980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f93000 r8:842119ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84211980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211980 r8:8027ed34 r7:dfb25e60 r6:84d7ce00 r5:84f93000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd85fb0 to 0xdfd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d8bd00 INFO: task kworker/0:56:3346 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f91800 r7:00000000 r6:83018200 r5:00001000 r4:7f123000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575c78c r4:8575c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575c78c r4:84d7cf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f91800 r8:84d7cf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7cf00 r8:8027ed34 r7:dfd3de60 r6:84d7cf80 r5:84f91800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd81fb0 to 0xdfd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dd080 INFO: task kworker/1:67:3350 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:68 state:D stack:0 pid:3353 tgid:3353 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f94800 r7:00000000 r6:83018200 r5:00001000 r4:7f11f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb267000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575bf8c r4:8575bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575bf8c r4:84d54000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f94800 r8:84d5402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54000 r8:8027ed34 r7:dfd3de60 r6:84d54080 r5:84f94800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd49fb0 to 0xdfd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dd2c0 INFO: task kworker/1:68:3353 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e07e5dc0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:69:3355 blocked for more than 452 seconds. r5:84f95400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85e9178c r4:85e91400 r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebe9f000 r10:61c88647 r9:84f96000 r8:84d542ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54280 r8:8027ed34 r7:dfda5e60 r6:84d54300 r5:84f96000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb1fb0 to 0xdfdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dd580 INFO: task kworker/1:70:3357 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:3358 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:3358 tgid:3358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd61d84 r8:00000002 r7:60000013 r6:dfd61d8c r5:84f90000 r4:84f90000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f90000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f90000 r8:84d5422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54200 r8:8027ed34 r7:dfda5e60 r6:84d54380 r5:84f90000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dd6c0 INFO: task kworker/1:71:3358 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85e9178c r4:85e91400 r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f16000 r7:00000000 r6:83018200 r5:00001000 r4:7f10f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf37000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85759b8c r4:85759800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85759b8c r4:84d54400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f16000 r8:84d5442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54400 r8:8027ed34 r7:dfd61e60 r6:84d54480 r5:84f16000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdc9fb0 to 0xdfdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dd6c0 INFO: task kworker/1:72:3360 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84a97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:73 state:D stack:0 pid:3363 tgid:3363 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdbde08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfdbdfb0 to 0xdfdbdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:74:3364 blocked for more than 452 seconds. r5:84f98c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3367 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3367 tgid:3367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfdedd84 r8:00000002 r7:60000013 r6:dfdedd8c r5:84f9a400 r4:84f9a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f9a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f117000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575ab8c r4:8575a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575ab8c r4:84d54700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f9a400 r8:84d5472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54700 r8:8027ed34 r7:dfdc9e60 r6:84d54780 r5:84f9a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdedfb0 to 0xdfdedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dde00 INFO: task kworker/1:75:3367 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:3368 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:3368 tgid:3368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfdf9d84 r8:00000002 r7:60000013 r6:dfdf9d8c r5:84c56000 r4:84c56000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c56000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c56000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575af8c r4:8575ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575af8c r4:84d54800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c56000 r8:84d5482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54800 r8:8027ed34 r7:dfdede60 r6:84211a80 r5:84c56000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf9fb0 to 0xdfdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dde00 INFO: task kworker/1:76:3368 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r5:85e9178c r4:85e91400 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84d84680 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:77:3371 blocked for more than 452 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:3371 tgid:3371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9b9d84 r8:00000002 r7:60000013 r6:df9b9d8c r5:84c56c00 r4:84c56c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c56c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c56c00 r7:00000000 r6:83018200 r5:00001000 r4:7f115000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575a78c r4:8575a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575a78c r4:84d54880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c56c00 r8:84d548ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54880 r8:8027ed34 r7:dfdede60 r6:84211b00 r5:84c56c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3d100 INFO: task kworker/1:77:3371 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3d1c0 INFO: task kworker/1:78:3374 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3376 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3376 tgid:3376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe11d84 r8:00000002 r7:60000013 r6:dfe11d8c r5:84c55400 r4:84c55400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c55400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:80:3378 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:80 state:D stack:0 pid:3378 tgid:3378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe19d84 r8:00000002 r7:60000013 r6:dfe19d8c r5:84c53000 r4:84c53000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c53000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c53000 r7:00000000 r6:83018200 r5:00001000 r4:7f107000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe01000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85758b8c r4:85758800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85758b8c r4:84d54a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c53000 r8:84d54a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54a00 r8:8027ed34 r7:dfe11e60 r6:84211c80 r5:84c53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe19fb0 to 0xdfe19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3d400 INFO: task kworker/1:80:3378 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:e07e5dc0 r4:00000000 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:dfe1dd84 r8:00000002 r7:60000013 r6:dfe1dd8c r5:84e70000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e70000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85751b8c r4:85751800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85751b8c r4:84d54a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e70000 r8:84d54aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54a80 r8:8027ed34 r7:dfe19e60 r6:84211d00 r5:84e70000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe1dfb0 to 0xdfe1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3d400 INFO: task kworker/1:81:3379 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3380 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3380 tgid:3380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe21d84 r8:00000002 r7:60000013 r6:dfe21d8c r5:84e70c00 r4:84e70c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e70c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6e40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f109000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe33000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85758f8c r4:85758c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85758f8c r4:84d54b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e70c00 r8:84d54b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54b00 r8:8027ed34 r7:dfe19e60 r6:84211d80 r5:84e70c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe21fb0 to 0xdfe21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3d400 INFO: task kworker/1:82:3380 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:3383 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:3383 tgid:3383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe29d84 r8:00000002 r7:60000013 r6:dfe29d8c r5:84e72400 r4:84e72400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e72400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6b00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e72400 r7:00000000 r6:83018200 r5:00001000 r4:7f103000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575838c r4:85758000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575838c r4:84d54b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e72400 r8:84d54bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54b80 r8:8027ed34 r7:dfe19e60 r6:84211e00 r5:84e72400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe29fb0 to 0xdfe29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3d780 INFO: task kworker/1:83:3383 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:3384 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:3384 tgid:3384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe2dd84 r8:00000002 r7:60000013 r6:dfe2dd8c r5:84e73000 r4:84e73000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e73000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d6c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e73000 r7:00000000 r6:83018200 r5:00001000 r4:7f105000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdb1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575878c r4:85758400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575878c r4:84d54c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e73000 r8:84d54c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d54c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54c00 r8:8027ed34 r7:dfe29e60 r6:84211e80 r5:84e73000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe2dfb0 to 0xdfe2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3d780 INFO: task kworker/1:84:3384 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:3386 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:3386 tgid:3386 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe31e08 r4:00000000 r4:84d54c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:84e74800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85757b8c r4:85757800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d54d00 r8:8027ed34 r7:dfe31e60 r6:84211f80 r5:84e74800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe35fb0 to 0xdfe35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:87 state:D stack:0 pid:3390 tgid:3390 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d54d80 r8:8027ed34 r7:dfe35e60 r6:84d25000 r5:84e75400 r4:84d3dbc0 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 task:kworker/1:88 state:D stack:0 pid:3393 tgid:3393 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe3de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebad9000 r7:ddde2d40 r6:83018200 r5:85756f8c r4:84d54e00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3de40 INFO: task kworker/1:88:3393 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 task:kworker/1:89 state:D stack:0 pid:3394 tgid:3394 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe41e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:90 state:D stack:0 pid:3395 tgid:3395 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe45e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d54f00 r8:8027ed34 r7:dfe3de60 r6:84d25180 r5:84e71800 r4:84d8b240 Call trace: r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:edc47000 r5:85e9178c r4:85e91400 r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:dfe55d84 r8:00000002 r7:60000013 r6:dfe55d8c r5:84f96c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe55e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eba4f000 r7:ddde2d40 r6:83018200 r5:8575678c r4:84d54f80 Exception stack(0xdfe55fb0 to 0xdfe55ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:84c50c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe61e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eba6d000 r7:ddde2d40 r6:83018200 r5:85756b8c r4:84d34000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c50c00 r8:84d3402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34000 r8:8027ed34 r7:dfe55e60 r6:84d25280 r5:84c50c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe61fb0 to 0xdfe61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d080 INFO: task kworker/1:92:3400 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:93:3403 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:93 state:D stack:0 pid:3403 tgid:3403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe7dd84 r8:00000002 r7:60000013 r6:dfe7dd8c r5:84c39800 r4:84c39800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c39800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf600 r4:00000000 r9:83018205 r8:84c39800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 r7:ddde2d40 r6:83018200 r5:85755b8c r4:84d34080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c39800 r8:84d340ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34080 r8:8027ed34 r7:dfe55e60 r6:84d25300 r5:84c39800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe7dfb0 to 0xdfe7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d280 INFO: task kworker/1:93:3403 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84c3a400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:8575638c r4:85756000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:95 state:D stack:0 pid:3406 tgid:3406 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfe91d84 r8:00000002 r7:60000013 r6:dfe91d8c r5:84c38c00 r4:84c38c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c38c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d60c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755f8c r4:85755c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85755f8c r4:84d34180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c38c00 r8:84d341ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34180 r8:8027ed34 r7:dfe7de60 r6:84d25400 r5:84c38c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe91fb0 to 0xdfe91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d700 INFO: task kworker/1:95:3406 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:96:3408 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r4:84c3b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea1e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e01dd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:97:3410 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:97 state:D stack:0 pid:3410 tgid:3410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfeb1d84 r8:00000002 r7:60000013 r6:dfeb1d8c r5:84c38000 r4:84c38000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84c38000 r8:84d342ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 r4:8478d980 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:82ac11e4 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:3412 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:3412 tgid:3412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfec1d84 r8:00000002 r7:60000013 r6:dfec1d8c r5:84c3bc00 r4:84c3bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c3bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855adec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c3bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc91000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d34300 r4:00000001 r4:8478d840 INFO: task kworker/1:98:3412 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:dfec9d84 r8:00000002 r7:60000013 r6:dfec9d8c r5:84c3c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:85754f8c r4:84d34380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c3c800 r8:84d343ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34380 r8:8027ed34 r7:dfea1e60 r6:84d25600 r5:84c3c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec9fb0 to 0xdfec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d9c0 INFO: task kworker/1:99:3414 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:e07e5dc0 r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:100 state:D stack:0 pid:3416 tgid:3416 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfee1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf280 r5:85751f8c r4:85751c00 r10:00000000 r9:84d34400 r8:8027ed34 r7:dfea1e60 r6:84d25680 r5:84c3d400 r4:8478db40 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:101 state:D stack:0 pid:3418 tgid:3418 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfef1e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cfec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb289000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754b8c r4:85754800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85754b8c r4:84d34480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c3e000 r8:84d344ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34480 r8:8027ed34 r7:dfea1e60 r6:84d25700 r5:84c3e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef1fb0 to 0xdfef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478dc40 INFO: task kworker/1:101:3418 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:102:3420 blocked for more than 452 seconds. Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff01e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r4:8478dfc0 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:103:3422 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:103 state:D stack:0 pid:3422 tgid:3422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dff11d84 r8:00000002 r7:60000013 r6:dff11d8c r5:84e68000 r4:84e68000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e68000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cfc00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e68000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575438c r4:85754000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575438c r4:84d34580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e68000 r8:84d345ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34580 r8:8027ed34 r7:dff01e60 r6:84d25800 r5:84e68000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff11fb0 to 0xdff11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3ff00 INFO: task kworker/1:103:3422 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:82ac11e4 r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff19e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85753f8c r4:85753c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85753f8c r4:84d34600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e69800 r8:84d3462c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34600 r8:8027ed34 r7:dff01e60 r6:84d25880 r5:84e69800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff19fb0 to 0xdff19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3ff00 INFO: task kworker/1:104:3424 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cfa00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf5b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85753b8c r4:85753800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85753b8c r4:84d34680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e6a400 r8:84d346ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34680 r8:8027ed34 r7:dff01e60 r6:84d25900 r5:84e6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff31fb0 to 0xdff31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847be240 INFO: task kworker/1:105:3426 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84e6b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d34700 r8:8027ed34 r7:dff01e60 r6:84d25980 r5:84e6b000 r4:847be180 Call trace: r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:107 state:D stack:0 pid:3430 tgid:3430 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855addc0 r5:85750b8c r4:85750800 r10:00000000 r9:84d34780 r8:8027ed34 r7:dfc21e60 r6:84d25a00 r5:84e6c800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf680 r5:85752f8c r4:85752c00 r10:00000000 r9:84d34800 r8:8027ed34 r7:dfd45e60 r6:84d25a80 r5:84e6e000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847be440 INFO: task kworker/1:108:3432 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:109:3434 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:3434 tgid:3434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd71d84 r8:00000002 r7:60000013 r6:dfd71d8c r5:84e6d400 r4:84e6d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e6d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf580 r5:85752b8c r4:85752800 r10:00000000 r9:84d34880 r8:8027ed34 r7:dfd45e60 r6:84d25b00 r5:84e6d400 r4:847be4c0 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8575278c r4:85752400 r10:00000000 r9:84d34900 r8:8027ed34 r7:dfd45e60 r6:84d25b80 r5:84e6ec00 r4:847be4c0 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3438 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3438 tgid:3438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfdadd84 r8:00000002 r7:60000013 r6:dfdadd8c r5:84e6bc00 r4:84e6bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e6bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd4d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575238c r4:85752000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575238c r4:84d34980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e6bc00 r8:84d349ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34980 r8:8027ed34 r7:dfd45e60 r6:84d25c00 r5:84e6bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847be800 INFO: task kworker/1:111:3438 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:112 state:D stack:0 pid:3440 tgid:3440 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbcc80 r5:00001000 r4:ebce5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575178c r4:85751400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575178c r4:84d34a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec3000 r8:84d34aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34a80 r8:8027ed34 r7:dfdc5e60 r6:84d25d00 r5:84ec3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde9fb0 to 0xdfde9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bea40 INFO: task kworker/1:113:3443 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918644 r9:dfe01d84 r8:00000002 r7:60000013 r6:dfe01d8c r5:84ec2400 r5:84ec2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ad800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ec2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb841000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574f38c r4:8574f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574f38c r4:84d34b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec2400 r8:84d34b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34b00 r8:8027ed34 r7:dfdc5e60 r6:84d25d80 r5:84ec2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe01fb0 to 0xdfe01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bee40 INFO: task kworker/1:114:3445 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80070013 ffffffff r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3447 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3447 tgid:3447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dff25d84 r8:00000002 r7:60000013 r6:dff25d8c r5:84f9c800 r4:84f9c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f9c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855adbc0 r5:8575038c r4:85750000 r10:00000000 r9:84d34b80 r8:8027ed34 r7:dfe01e60 r6:84d34c00 r5:84f9c800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3448 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3448 tgid:3448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa75d84 r8:00000002 r7:60000013 r6:dfa75d8c r5:84f9d400 r4:84f9d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f9d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855adcc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb23000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8575078c r4:85750400 r10:00000000 r9:84d34c80 r8:8027ed34 r7:dff25e60 r6:84d34d00 r5:84f9d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe07e5fb0 to 0xe07e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84f9e000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff41e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb929000 r7:ddde2d40 r6:83018200 r5:8574ff8c r4:84d34d80 Exception stack(0xdff41fb0 to 0xdff41ff8) r4:8461b840 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:118:3453 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:118 state:D stack:0 pid:3453 tgid:3453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dff49d84 r8:00000002 r7:60000013 r6:dff49d8c r5:84f9ec00 r4:84f9ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84f9ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ad9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574fb8c r4:8574f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574fb8c r4:84d34e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f9ec00 r8:84d34eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d34e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d34e80 r8:8027ed34 r7:dff41e60 r6:84d34f00 r5:84f9ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff49fb0 to 0xdff49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847db040 INFO: task kworker/1:118:3453 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:120 state:D stack:0 pid:3457 tgid:3457 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff51e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847dd080 r8:8027ed34 r7:dff45e60 r6:847dd100 r5:84f99800 r4:847db040 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3801 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3801 tgid:3801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e06c5d84 r8:00000002 r7:60000013 r6:e06c5d8c r5:84c76c00 r4:84c76c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c76c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507c38c r4:8507c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507c38c r4:84208f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c76c00 r8:84208f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84208f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84208f00 r8:8027ed34 r7:e00a1e60 r6:84208f80 r5:84c76c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:337 state:D stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0851e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 INFO: task kworker/1:337:3938 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:3939 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0855d84 r8:00000002 r7:60000113 r6:e0855d8c r5:8506d400 r4:8506d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8506d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0855e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfffd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8506d400 r8:84345eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:339 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28d80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff95000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ecb8c r4:850ec800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ecb8c r4:84345f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506bc00 r8:84345fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345f80 r8:8027ed34 r7:e0855e60 r6:85029000 r5:8506bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe084dfb0 to 0xe084dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28b80 INFO: task kworker/1:339:3941 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:3942 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0849d84 r8:00000002 r7:60000113 r6:e0849d8c r5:84eb3c00 r4:84eb3c00 r5:84eb3c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0849e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ed38c r4:85029080 Exception stack(0xe0849fb0 to 0xe0849ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0869e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85029100 r8:8027ed34 r7:e0849e60 r6:847d6d80 r5:84eb1800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0871e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850335c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eb6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0147000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee38c r4:850ee000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ee38c r4:85029180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eb6000 r8:850291ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029180 r8:8027ed34 r7:e0869e60 r6:847d6e00 r5:84eb6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0871fb0 to 0xe0871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85033000 INFO: task kworker/1:342:3949 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 84dbb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3950 blocked for more than 453 seconds. Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0875e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e00bd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:3951 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0879d84 r8:00000002 r7:60000113 r6:e0879d8c r5:84eb6c00 r4:84eb6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eb6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00f7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850edf8c r4:850edc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850edf8c r4:85029200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eb6c00 r8:8502922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029200 r8:8027ed34 r7:e0871e60 r6:847d6f80 r5:84eb6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0881d84 r8:00000002 r7:60000013 r6:e0881d8c r5:84eb2400 r4:84eb2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eb2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0881e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033b00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eb2400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85029280 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 879f7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0889e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8453a78c r4:847fa080 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:3957 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:3957 tgid:3957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e088dd84 r8:00000002 r7:60000013 r6:e088dd8c r5:85010c00 r4:85010c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85010c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e088de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850336c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85010c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e015d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee78c r4:850ee400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ee78c r4:85029300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010c00 r8:8502932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029300 r8:8027ed34 r7:e0881e60 r6:847fa180 r5:85010c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe088dfb0 to 0xe088dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850333c0 INFO: task kworker/1:345:3957 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 87de6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 task:kworker/1:346 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e085de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85070000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0199000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eeb8c r4:850ee800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eeb8c r4:85029380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85070000 r8:850293ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029380 r8:8027ed34 r7:e0881e60 r6:85029400 r5:85070000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe085dfb0 to 0xe085dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850334c0 INFO: task kworker/1:346:3959 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 87de6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e089de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85071800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01d1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eef8c r4:850eec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eef8c r4:85029480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85071800 r8:850294ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029480 r8:8027ed34 r7:e0881e60 r6:85029500 r5:85071800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe089dfb0 to 0xe089dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85033680 INFO: task kworker/1:347:3962 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 881a2000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:3964 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e08a1d84 r8:00000002 r7:60000013 r6:e08a1d8c r5:85072400 r4:85072400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85072400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85072400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ef78c r4:85029580 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 881a2000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:3966 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e08a5d84 r8:00000002 r7:60000013 r6:e08a5d8c r5:85073000 r4:85073000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85029700 r8:8027ed34 r7:e08a1e60 r6:85029780 r5:85073000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:3968 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0859d84 r8:00000002 r7:60000013 r6:e0859d8c r5:85074800 r4:85074800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85074800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0859e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85074800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0707000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eff8c r4:850efc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eff8c r4:85029800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85074800 r8:8502982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029800 r8:8027ed34 r7:e08a5e60 r6:85029880 r5:85074800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0859fb0 to 0xe0859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85033f00 INFO: task kworker/1:350:3968 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 884b5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:e08b5d84 r8:00000002 r7:60000013 r6:e08b5d8c r5:85076000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85029900 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:3971 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e08add84 r8:00000002 r7:60000013 r6:e08add8c r5:85073c00 r4:85073c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85073c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28e00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85073c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0729000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f038c r4:850f0000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f038c r4:85029a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85073c00 r8:85029a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029a00 r8:8027ed34 r7:e08b5e60 r6:85029a80 r5:85073c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08adfb0 to 0xe08adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85033cc0 INFO: task kworker/1:352:3971 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 88b94000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e08bdd84 r8:00000002 r7:60000013 r6:e08bdd8c r5:84e98c00 r4:84e98c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e98c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d7e180 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0737000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f078c r4:850f0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f078c r4:85029b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e98c00 r8:85029b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029b00 r8:8027ed34 r7:e08b5e60 r6:847fa200 r5:84e98c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08bdfb0 to 0xe08bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d7e0c0 INFO: task kworker/1:353:3973 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 88f9a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:e08b9d84 r8:00000002 r7:60000013 r6:e08b9d8c r5:84e98000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b9e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:3978 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:3978 tgid:3978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e08c9d84 r8:00000002 r7:60000113 r6:e08c9d8c r5:84e9b000 r4:84e9b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e9b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d7e680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08db000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f138c r4:850f1000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f138c r4:85029b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9b000 r8:85029bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029b80 r8:8027ed34 r7:e08b5e60 r6:847fa380 r5:84e9b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08c9fb0 to 0xe08c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d7e280 INFO: task kworker/1:354:3978 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 891e1000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:355 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08d5e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f0f8c r4:850f0c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f0f8c r4:85029c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9bc00 r8:85029c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029c00 r8:8027ed34 r7:e08c9e60 r6:847fa400 r5:84e9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08d5fb0 to 0xe08d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d7e280 INFO: task kworker/1:355:3979 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8976a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f1e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84e9d400 r8:85029cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029c80 r8:8027ed34 r7:e08c9e60 r6:847fa480 r5:84e9d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f1fb0 to 0xe08f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d7e440 INFO: task kworker/1:356:3982 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8976a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f9e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85029d00 Exception stack(0xe08f9fb0 to 0xe08f9ff8) r4:84d7e600 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d7e8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85075400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0903000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f1b8c r4:850f1800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f1b8c r4:85029d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85075400 r8:85029dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029d80 r8:8027ed34 r7:e08f1e60 r6:85029e00 r5:85075400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08c1fb0 to 0xe08c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d7e800 INFO: task kworker/1:358:3985 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8a05b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:3988 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0915d84 r8:00000002 r7:60000113 r6:e0915d8c r5:85076c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0915e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:850f238c r4:85029e80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:3990 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:3990 tgid:3990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0925d84 r8:00000002 r7:60000113 r6:e0925d8c r5:85070c00 r4:85070c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85070c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0925e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d7ee80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85070c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0947000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f2b8c r4:850f2800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f2b8c r4:85029f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85070c00 r8:85029fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85029f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85029f80 r8:8027ed34 r7:e0915e60 r6:85029680 r5:85070c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0925fb0 to 0xe0925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d7ea40 INFO: task kworker/1:360:3990 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8a2bf000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0959e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850f278c r4:850f2400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f278c r4:85031000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9a400 r8:8503102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031000 r8:8027ed34 r7:e0925e60 r6:847fa580 r5:84e9a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0959fb0 to 0xe0959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d7eb40 INFO: task kworker/1:361:3992 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8a2bf000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e096de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d7efc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e095f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f2f8c r4:850f2c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f2f8c r4:85031080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9ec00 r8:850310ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031080 r8:8027ed34 r7:e0925e60 r6:847fa600 r5:84e9ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe096dfb0 to 0xe096dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:363 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0971e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:850f878c r4:85031100 Exception stack(0xe0971fb0 to 0xe0971ff8) r4:84d7ed00 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e097de08 r4:00000000 r5:00001000 r4:e0973000 r10:61c88647 r9:84eb3000 r8:850311ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031180 r8:8027ed34 r7:e0971e60 r6:847fa700 r5:84eb3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe097dfb0 to 0xe097dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f1c040 INFO: task kworker/1:364:3997 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8ac93000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4000 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4000 tgid:4000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e4999d84 r8:00000002 r7:60000013 r6:e4999d8c r5:85140c00 r4:85140c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85140c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4999e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1c2c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85140c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4981000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f378c r4:850f3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f378c r4:85031200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85140c00 r8:8503122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe4999fb0 to 0xe4999ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe07e5d20 to 0xe07e5d68) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 task:kworker/1:366 state:D stack:0 pid:4001 tgid:4001 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e498d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f3b8c r4:850f3800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f3b8c r4:85031280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506ec00 r8:850312ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031280 r8:8027ed34 r7:e0971e60 r6:85031300 r5:8506ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0935fb0 to 0xe0935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f1c140 INFO: task kworker/1:366:4001 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8b0d6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:4003 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:4003 tgid:4003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e4991d84 r8:00000002 r7:60000113 r6:e4991d8c r5:85150000 r4:85150000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85150000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4991e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512ccc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85150000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa41000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850fa38c r4:850fa000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850fa38c r4:85031380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:850313ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85031380 r8:8027ed34 r7:e0971e60 r6:85031400 r5:85150000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8b0d6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84da7100 Not tainted 6.16.0-rc1-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851344c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85150c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507c78c r4:8507c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507c78c r4:847fa800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150c00 r8:847fa82c r7:82804d40 r6:dddced40 r5:dddced60 r4:847fa800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fa800 r8:8027ed34 r7:e06c5e60 r6:85031480 r5:85150c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49c5fb0 to 0xe49c5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 8ba50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85151800 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8ba50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4012 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e49e5d84 r8:00000002 r7:60000113 r6:e49e5d8c r5:85152400 r4:85152400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85152400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501b400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85152400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f8f8c r4:850f8c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f8f8c r4:85031600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85152400 r8:8503162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031600 r8:8027ed34 r7:e08c5e60 r6:85031680 r5:85152400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49e5fb0 to 0xe49e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 8ba50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:4014 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e49e9d84 r8:00000002 r7:60000113 r6:e49e9d8c r5:85153000 r4:85153000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85153000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851345c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85153000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd05000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507cb8c r4:8507c800 r7:dddced40 r6:83018000 r5:8507cb8c r4:847fa880 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8c260000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:82:4016 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:82 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e49edd84 r8:00000002 r7:60000013 r6:e49edd8c r5:85153c00 r4:85153c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85153c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85153c00 r8:847fa92c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49edfb0 to 0xe49edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85134240 INFO: task kworker/0:82:4016 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8c260000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e9178c r4:85e91400 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:83 state:D stack:0 pid:4018 tgid:4018 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 8c5a7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:4020 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e49f5d84 r8:00000002 r7:60000013 r6:e49f5d8c r5:85155400 r4:85155400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85155400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85155400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff89000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507db8c r4:8507d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507db8c r4:847faa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85155400 r8:847faa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847faa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847faa00 r8:8027ed34 r7:e49f1e60 r6:85031900 r5:85155400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49f5fb0 to 0xe49f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851346c0 INFO: task kworker/0:84:4020 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8c5a7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:e49f9d84 r8:00000002 r7:60000113 r6:e49f9d8c r5:85156000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49f9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8ce72000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:4022 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e49fdd84 r8:00000002 r7:60000013 r6:e49fdd8c r5:85156c00 r4:85156c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85156c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507d78c r4:8507d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507d78c r4:847faa80 r10:00000000 r9:847faa80 r8:8027ed34 r7:e49f5e60 r6:85031a00 r5:85156c00 r4:851346c0 Workqueue: events bpf_prog_free_deferred 5d20: 8ce72000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49e1e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847fab00 r8:8027ed34 r7:e49f5e60 r6:847fab80 r5:85142400 r4:85134a00 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:4026 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:4026 tgid:4026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a09d84 r8:00000002 r7:60000013 r6:e8a09d8c r5:85143000 r4:85143000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85143000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a4b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85143000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0131000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507e78c r4:8507e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507e78c r4:847fac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85143000 r8:847fac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847fac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fac00 r8:8027ed34 r7:e49e1e60 r6:847fac80 r5:85143000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a09fb0 to 0xe8a09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85134900 INFO: task kworker/0:87:4026 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8ce72000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:88:4028 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:4028 tgid:4028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a0dd84 r8:00000002 r7:60000113 r6:e8a0dd8c r5:85141800 r4:85141800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85141800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134e80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85141800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507e38c r4:8507e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507e38c r4:847fad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85141800 r8:847fad2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847fad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fad00 r8:8027ed34 r7:e8a09e60 r6:847fad80 r5:85141800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a0dfb0 to 0xe8a0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85134dc0 INFO: task kworker/0:88:4028 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8d6c0000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a05e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8507eb8c r4:847fae00 Exception stack(0xe8a05fb0 to 0xe8a05ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85144800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ab000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507f38c r4:8507f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507f38c r4:847faf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85144800 r8:847faf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847faf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847faf00 r8:8027ed34 r7:e8a05e60 r6:847faf80 r5:85144800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a15fb0 to 0xe8a15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512c000 INFO: task kworker/0:90:4033 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8db48000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:4034 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a19d84 r8:00000002 r7:60000113 r6:e8a19d8c r5:85145400 r4:85145400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85145400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:4037 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85146000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85146000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507f78c r4:8507f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507f78c r4:85136100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85146000 r8:8513612c r7:82804d40 r6:dddced40 r5:dddced60 r4:85136100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136100 r8:8027ed34 r7:e8a15e60 r6:85136180 r5:85146000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a1dfb0 to 0xe8a1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512c200 INFO: task kworker/0:92:4037 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8e009000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 Workqueue: events bpf_prog_free_deferred r5:85146c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a21e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85146c00 r8:8513622c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8e44b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:94:4042 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:94 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:e8a25d84 r8:00000002 r7:60000013 r6:e8a25d8c r5:85140000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a25e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e05ed000 r10:61c88647 r9:85140000 r8:8513632c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 8e44b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84e9e000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a2de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85136400 r8:8027ed34 r7:e8a25e60 r6:85136480 r5:84e9e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8e676000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:96:4044 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:96 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a11d84 r8:00000002 r7:60000013 r6:e8a11d8c r5:84e99800 r4:84e99800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e99800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e99800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0603000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c438c r4:850c4000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c438c r4:85136500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e99800 r8:8513652c r7:82804d40 r6:dddced40 r5:dddced60 r4:85136500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136500 r8:8027ed34 r7:e8a2de60 r6:85136580 r5:84e99800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a11fb0 to 0xe8a11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:97:4047 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:97 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a39d84 r8:00000002 r7:60000013 r6:e8a39d8c r5:84cd1800 r4:84cd1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cd1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512cb40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cd1800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0613000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c478c r4:850c4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c478c r4:85136600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd1800 r8:8513662c r7:82804d40 r6:dddced40 r5:dddced60 r4:85136600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136600 r8:8027ed34 r7:e8a2de60 r6:85136680 r5:84cd1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a39fb0 to 0xe8a39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512c9c0 INFO: task kworker/0:97:4047 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8eb24000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4050 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4050 tgid:4050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a41d84 r8:00000002 r7:60000113 r6:e8a41d8c r5:84cd2400 r4:84cd2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cd2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a41e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85031a80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84cd0c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a3de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cd0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c638c r4:850c6000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c638c r4:85136780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd0c00 r8:851367ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85136780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136780 r8:8027ed34 r7:e8a2de60 r6:85136800 r5:84cd0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a3dfb0 to 0xe8a3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512ce80 INFO: task kworker/0:98:4051 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8f1a7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:99:4053 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918644 r9:e8a49d84 r8:00000002 r7:60000113 r6:e8a49d8c r5:84cd0000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a49e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84cd0000 r8:851368ac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4055 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a51e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850fb38c r4:850fb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850fb38c r4:85031b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd4800 r8:85031b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031b00 r8:8027ed34 r7:e8a41e60 r6:85136980 r5:84cd4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a51fb0 to 0xe8a51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8501b300 INFO: task kworker/1:372:4055 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8f4ab000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a55e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85031b80 r8:8027ed34 r7:e8a51e60 r6:85136a00 r5:84cd5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a55fb0 to 0xe8a55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8501b580 INFO: task kworker/1:373:4056 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8f4f3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/1:374:4058 blocked for more than 454 seconds. r4:84cd6000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501b600 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 8fa3b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a65e08 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850f9b8c r4:85031c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd6c00 r8:85031cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031c80 r8:8027ed34 r7:e8a51e60 r6:85136b00 r5:84cd6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a65fb0 to 0xe8a65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8501b4c0 INFO: task kworker/1:375:4061 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8fa3b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:100:4062 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:100 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a69d84 r8:00000002 r7:60000013 r6:e8a69d8c r5:84cd3c00 r4:84cd3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a69e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e07fb000 r10:61c88647 r9:84cd3c00 r8:85136bac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501b9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f9f8c r4:850f9c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850f9f8c r4:85031d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e9800 r8:85031d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85031d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85031d00 r8:8027ed34 r7:e8a51e60 r6:85136c80 r5:844e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a75fb0 to 0xe8a75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8501b700 INFO: task kworker/1:376:4065 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 8fe81000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f7b80 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85136d00 r8:8027ed34 r7:e8a3de60 r6:85136d80 r5:844e8c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 90116000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:102:4068 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:102 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e8a71d84 r8:00000002 r7:60000113 r6:e8a71d8c r5:844ea400 r4:844ea400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ea400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f7d80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c5f8c r4:850c5c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c5f8c r4:85136e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ea400 r8:85136e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85136e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136e00 r8:8027ed34 r7:e8a3de60 r6:85136e80 r5:844ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a71fb0 to 0xe8a71ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:103 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c6b8c r4:850c6800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c6b8c r4:85136f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844eb000 r8:85136f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85136f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136f00 r8:8027ed34 r7:e8a3de60 r6:85136f80 r5:844eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f7dc0 INFO: task kworker/0:103:4071 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 90459000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:104 state:D stack:0 pid:4073 tgid:4073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:844ec800 r4:844ec800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ec800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a240 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c678c r4:850c6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c678c r4:85138000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ec800 r8:8513802c r7:82804d40 r6:dddced40 r5:dddced60 r4:85138000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138000 r8:8027ed34 r7:eaaa5e60 r6:85138080 r5:844ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f7dc0 INFO: task kworker/0:104:4073 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9059a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:377 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850c6f8c r4:85031d80 Exception stack(0xeaab1fb0 to 0xeaab1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:850c738c r4:85138180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ebc00 r8:851381ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85138180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138180 r8:8027ed34 r7:eaaa5e60 r6:85138200 r5:844ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8513a140 INFO: task kworker/0:105:4077 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 90c95000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84da7100 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85031e00 r8:8027ed34 r7:e8a51e60 r6:85138300 r5:844ee000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a31e08 r4:00000000 r5:00001000 r4:eaaeb000 r10:61c88647 r9:844eec00 r8:851383ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 910eb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:107:4082 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:107 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaae5d84 r8:00000002 r7:60000013 r6:eaae5d8c r5:844e8000 r4:844e8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c778c r4:850c7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c778c r4:85138480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e8000 r8:851384ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85138480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138480 r8:8027ed34 r7:e8a31e60 r6:85138500 r5:844e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:107:4082 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d20: 910eb000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a35e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe8a35fb0 to 0xe8a35ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 91870000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:109:4087 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:109 state:D stack:0 pid:4087 tgid:4087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaaf5d84 r8:00000002 r7:60000013 r6:eaaf5d8c r5:84cc0000 r4:84cc0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cc0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ad80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cc0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab03000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d438c r4:850d4000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d438c r4:85138680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc0000 r8:851386ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85138680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138680 r8:8027ed34 r7:e8a35e60 r6:85138700 r5:84cc0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:109:4087 is blocked on a mutex likely owned by task kworker/1:311:3883. [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 91870000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85138780 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85148000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d4b8c r4:850d4800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d4b8c r4:85138880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85148000 r8:851388ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85138880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138880 r8:8027ed34 r7:eab01e60 r6:85031e80 r5:85148000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8513ae40 INFO: task kworker/0:111:4091 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 91abe000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84da7100 task:kworker/0:112 state:D stack:0 pid:4093 tgid:4093 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab35d84 r8:00000002 r7:60000013 r6:eab35d8c r5:8514bc00 r4:8514bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8514bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab37000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d538c r4:850d5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d538c r4:85138980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514bc00 r8:851389ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85138980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138980 r8:8027ed34 r7:eab31e60 r6:85031f80 r5:8514bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f7d00 INFO: task kworker/0:113:4095 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 920a0000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08fde08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85025000 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 92466000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc3380 r7:ddde2d40 r6:83018200 r5:850faf8c r4:85025100 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:380:4103 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 92466000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:114:4105 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:114 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaae9d84 r8:00000002 r7:60000113 r6:eaae9d8c r5:8514c800 r4:8514c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8514c800 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d578c r4:850d5400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d578c r4:85138a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514c800 r8:85138a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85138a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138a00 r8:8027ed34 r7:eab35e60 r6:85025200 r5:8514c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126440 INFO: task kworker/0:114:4105 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80070013 ffffffff r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:115:4107 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:115 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e0941d84 r8:00000002 r7:60000113 r6:e0941d8c r5:8514e000 r4:8514e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0941e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851263c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8514e000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d5b8c r4:850d5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d5b8c r4:85138a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514e000 r8:85138aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85138a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138a80 r8:8027ed34 r7:eaae9e60 r6:85025280 r5:8514e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0941fb0 to 0xe0941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0969e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85138b00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:8514a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0979e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:850d5f8c r4:850d5c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d5f8c r4:85138b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514a400 r8:85138bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85138b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138b80 r8:8027ed34 r7:e0969e60 r6:85025400 r5:8514a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0979fb0 to 0xe0979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126440 INFO: task kworker/0:117:4109 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 92c63000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4110 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:e4985d84 r8:00000002 r7:60000113 r6:e4985d8c r5:85149800 r4:85149800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4985e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85025380 r8:8027ed34 r7:e8a51e60 r6:85025480 r5:85149800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe07e5d20 to 0xe07e5d68) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84ea8000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0965e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc3b00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ea8000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850fbb8c r4:850fb800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850fbb8c r4:85025500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea8000 r8:8502552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025500 r8:8027ed34 r7:e4985e60 r6:85025580 r5:84ea8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0965fb0 to 0xe0965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc3700 INFO: task kworker/1:382:4112 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 92fa0000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85025600 r8:8027ed34 r7:e0965e60 r6:85025680 r5:84ea8c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:4119 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:84eaa400 r4:84eaa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eaa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc3e80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510838c r4:85108000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510838c r4:85025800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eaa400 r8:8502582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025800 r8:8027ed34 r7:eab45e60 r6:85025880 r5:84eaa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc3bc0 INFO: task kworker/1:385:4119 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9346b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512b300 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01ad000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510938c r4:85109000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510938c r4:85025900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eab000 r8:8502592c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025900 r8:8027ed34 r7:eab4de60 r6:85025980 r5:84eab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dc3d00 INFO: task kworker/1:386:4120 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 93759000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85025a00 Exception stack(0xeab55fb0 to 0xeab55ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84eac800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501bb40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eac800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e011f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85108b8c r4:85108800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85108b8c r4:85025b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eac800 r8:85025b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025b00 r8:8027ed34 r7:eab51e60 r6:85025b80 r5:84eac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512b080 INFO: task kworker/1:388:4124 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 93d59000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4126 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba49d84 r8:00000002 r7:60000013 r6:eba49d8c r5:84eae000 r4:84eae000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eae000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84eae000 r8:85025c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:4128 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:4128 tgid:4128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab65d84 r8:00000002 r7:60000013 r6:eab65d8c r5:84eaec00 r4:84eaec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eaec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512bac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eaec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0727000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85109f8c r4:85109c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85109f8c r4:85025d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eaec00 r8:85025d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025d00 r8:8027ed34 r7:eab51e60 r6:85025d80 r5:84eaec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512b2c0 INFO: task kworker/1:390:4128 is blocked on a mutex likely owned by task kworker/1:311:3883. r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:84ec8c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8510978c r4:85109400 r4:85025e00 Exception stack(0xeab6dfb0 to 0xeab6dff8) r4:8512b500 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:392 state:D stack:0 pid:4132 tgid:4132 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85109b8c r4:85109800 r4:85025f00 Exception stack(0xeab71fb0 to 0xeab71ff8) r4:8512b700 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 941c2000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:4135 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:4135 tgid:4135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:84ec8000 r4:84ec8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ec8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512bbc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ec8000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510a38c r4:8510a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510a38c r4:8513d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec8000 r8:8513d02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513d000 r8:8027ed34 r7:eab65e60 r6:8513d080 r5:84ec8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512bb00 INFO: task kworker/1:393:4135 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:4138 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4138 tgid:4138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:84ecb000 r4:84ecb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ecb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512bf00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ecb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0861000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510ab8c r4:8510a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510ab8c r4:8513d100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ecb000 r8:8513d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513d100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513d100 r8:8027ed34 r7:eab69e60 r6:8513d180 r5:84ecb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8512b9c0 INFO: task kworker/1:394:4138 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 944e2000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eab61d84 r8:00000002 r7:60000013 r6:eab61d8c r5:84ecbc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8513d200 r8:8027ed34 r7:eab79e60 r6:8513d280 r5:84ecbc00 r4:8512bb40 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4140 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4140 tgid:4140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab81d84 r8:00000002 r7:60000013 r6:eab81d8c r5:84ecc800 r4:84ecc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ecc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d50140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ecc800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0891000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510b38c r4:8510b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510b38c r4:8513d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ecc800 r8:8513d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513d300 r10:00000000 r9:8513d300 r8:8027ed34 r7:eab79e60 r6:8513d380 r5:84ecc800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:118:4143 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:118 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:84ecd400 r4:84ecd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ecd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85191a00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ecd400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ecd400 r8:85138c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85138c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85138c00 r8:8027ed34 r7:e0969e60 r6:8513d400 r5:84ecd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126f40 INFO: task kworker/0:118:4143 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9504c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501b080 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ece000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e087d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510af8c r4:8510ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510af8c r4:8513d480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ece000 r8:8513d4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513d480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513d480 r8:8027ed34 r7:eab81e60 r6:8513d500 r5:84ece000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8501bd00 INFO: task kworker/1:397:4144 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9504c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:8510b78c r4:8510b400 r4:8513d580 Exception stack(0xeab89fb0 to 0xeab89ff8) r4:84d501c0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9504c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:4147 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab8dd84 r8:00000002 r7:60000013 r6:eab8dd8c r5:84ec9800 r4:84ec9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ec9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e08e5000 r7:ddde2d40 r6:83018200 r5:8510bb8c r4:8513d680 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:4150 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:84ead400 r4:84ead400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ead400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d505c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ead400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08ff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510bf8c r4:8510bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510bf8c r4:8513d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ead400 r8:8513d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513d780 r8:8027ed34 r7:eab8de60 r6:8513d800 r5:84ead400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:401 state:D stack:0 pid:4152 tgid:4152 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d50740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85158000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0909000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511438c r4:85114000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511438c r4:8513d880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85158000 r8:8513d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513d880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513d880 r8:8027ed34 r7:eab91e60 r6:8513d900 r5:85158000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d503c0 INFO: task kworker/1:401:4152 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 95669000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r5:00001000 r4:edc47000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4155 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eab99d84 r8:00000002 r7:60000013 r6:eab99d8c r5:85158c00 r4:85158c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85158c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85158c00 r8:8513d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d50540 INFO: task kworker/1:402:4155 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 958dc000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8513da80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4158 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:84cc3000 r4:84cc3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cc3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d50bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0955000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85114f8c r4:85114c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85114f8c r4:8513db80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc3000 r8:8513dbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513db80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513db80 r8:8027ed34 r7:eab9de60 r6:85138c80 r5:84cc3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d50940 INFO: task kworker/1:404:4158 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 95d01000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8513dc00 r8:8027ed34 r7:eaba9e60 r6:85138d00 r5:84cc6000 r4:84d50dc0 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:4162 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:4162 tgid:4162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:84cc6c00 r4:84cc6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cc6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d50fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49c9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85115b8c r4:85115800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85115b8c r4:8513dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc6c00 r8:8513dcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513dc80 r8:8027ed34 r7:eabbde60 r6:85138d80 r5:84cc6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d50c80 INFO: task kworker/1:406:4162 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9670d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e07e5dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:4163 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:8515a400 r4:8515a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d50dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e499b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511578c r4:85115400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511578c r4:8513dd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515a400 r8:8513dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513dd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513dd00 r8:8027ed34 r7:eabc1e60 r6:8513dd80 r5:8515a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d50c80 INFO: task kworker/1:407:4163 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9670d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:408 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1040 r7:ddde2d40 r6:83018200 r5:8511638c r4:8513de00 Exception stack(0xeabb5fb0 to 0xeabb5ff8) r4:8420a8c0 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4167 tgid:4167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:84cc4800 r4:84cc4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cc4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d50f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49d7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85115f8c r4:85115c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85115f8c r4:8513df00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc4800 r8:8513df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513df00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513df00 r8:8027ed34 r7:eabb5e60 r6:85138e00 r5:84cc4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8420a8c0 INFO: task kworker/1:409:4167 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 96d10000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:410 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:84cc3c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511678c r4:85116400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511678c r4:847e2000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc3c00 r8:847e202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2000 r8:8027ed34 r7:eac01e60 r6:85138f00 r5:84cc3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d11c0 INFO: task kworker/1:411:4172 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 971fc000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4173 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:84cc5400 r4:84cc5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cc5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84cc5400 r8:847e20ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:413:4175 blocked for more than 455 seconds. r10:82918644 r9:eac1dd84 r8:00000002 r7:60000013 r6:eac1dd8c r5:84cb8000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85116f8c r4:85116c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4177 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4177 tgid:4177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac2dd84 r8:00000002 r7:60000013 r6:eac2dd8c r5:84cb9800 r4:84cb9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cb9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cb9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac23000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511738c r4:85117000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511738c r4:847e2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb9800 r8:847e21ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2180 r8:8027ed34 r7:eac01e60 r6:841de080 r5:84cb9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d15c0 INFO: task kworker/1:414:4177 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:415 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eac33000 r5:8511778c r4:85117400 r10:61c88647 r9:8515bc00 r8:847e222c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4182 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:8515c800 r4:8515c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac57000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512038c r4:85120000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512038c r4:847e2380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515c800 r8:847e23ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2380 r8:8027ed34 r7:eac01e60 r6:847e2400 r5:8515c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:847d1a40 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:417 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847e2300 r8:8027ed34 r7:eac31e60 r6:847e2480 r5:8515d400 r4:847d1a40 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:85e9178c r4:85e91400 r4:84d84680 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:4186 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac49d84 r8:00000002 r7:60000013 r6:eac49d8c r5:8515e000 r4:8515e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515e000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9bf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85120f8c r4:85120c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85120f8c r4:847e2500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515e000 r8:847e252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2500 r8:8027ed34 r7:eac31e60 r6:847e2580 r5:8515e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac49fb0 to 0xeac49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d1b00 INFO: task kworker/1:418:4186 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 982f6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:419 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1e00 r5:8512078c r4:85120400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4190 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4190 tgid:4190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac71d84 r8:00000002 r7:60000113 r6:eac71d8c r5:85160000 r4:85160000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85160000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85160000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac73000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85120b8c r4:85120800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85120b8c r4:847e2700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85160000 r8:847e272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2700 r8:8027ed34 r7:eac49e60 r6:847e2780 r5:85160000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d1d00 INFO: task kworker/1:420:4190 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85160c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847e2800 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f1080 INFO: task kworker/1:421:4192 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 98c8b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:4195 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac55d84 r8:00000002 r7:60000013 r6:eac55d8c r5:85162400 r4:85162400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85162400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85162400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512178c r4:85121400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512178c r4:847e2900 r4:847e2900 Exception stack(0xeac55fb0 to 0xeac55ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:423 state:D stack:0 pid:4196 tgid:4196 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85163000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r10:61c88647 r9:85163000 r8:847e2a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847f1380 INFO: task kworker/1:423:4196 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 98c8b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4198 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:85163c00 r4:85163c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85163c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85163c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:85165400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1a00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85165400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd29000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512238c r4:85122000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512238c r4:847e2c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85165400 r8:847e2c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2c00 r8:8027ed34 r7:eaaa1e60 r6:847e2c80 r5:85165400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f1600 INFO: task kworker/1:425:4200 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 99133000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4203 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:85161800 r4:85161800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85161800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85161800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512278c r4:85122400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512278c r4:847e2d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85161800 r8:847e2d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2d00 r8:8027ed34 r7:eaac9e60 r6:847e2d80 r5:85161800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85166000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85166000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff35000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85122b8c r4:85122800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85122b8c r4:847e2e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85166000 r8:847e2e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2e00 r8:8027ed34 r7:eaa8de60 r6:847e2e80 r5:85166000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad1fb0 to 0xeaad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f1400 INFO: task kworker/1:427:4204 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9985e000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4207 tgid:4207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaaddd84 r8:00000002 r7:60000113 r6:eaaddd8c r5:85166c00 r4:85166c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85166c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1d80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85166c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85122f8c r4:85122c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85122f8c r4:847e2f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85166c00 r8:847e2f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e2f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2f00 r8:8027ed34 r7:eaad1e60 r6:847e2f80 r5:85166c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f1880 INFO: task kworker/1:428:4207 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9985e000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:82ac11e4 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:430 state:D stack:0 pid:4210 tgid:4210 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85168c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0217000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512338c r4:85123000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512338c r4:85180100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85168c00 r8:8518012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85180100 r8:8027ed34 r7:eaaf1e60 r6:85180180 r5:85168c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f1e40 INFO: task kworker/1:430:4210 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9a09a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918644 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:85169800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85180200 r8:8027ed34 r7:eaaf1e60 r6:85180280 r5:85169800 r4:8517f100 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:85e9178c r4:85e91400 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e05fb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bc78c r4:851bc400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bc78c r4:85180300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516a400 r8:8518032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85180300 r8:8027ed34 r7:eab21e60 r6:85180380 r5:8516a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517f280 INFO: task kworker/1:432:4216 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9a863000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/1:433:4217 blocked for more than 455 seconds. r4:8516b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:85123f8c r4:85123c00 r4:85180400 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:434 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517f680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8516bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bc38c r4:851bc000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bc38c r4:85180500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516bc00 r8:8518052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85180500 r8:8027ed34 r7:eab09e60 r6:85180580 r5:8516bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab3dfb0 to 0xeab3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517f480 INFO: task kworker/1:434:4219 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9a863000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:851bcb8c r4:85180600 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 9a863000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4224 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4224 tgid:4224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac81d84 r8:00000002 r7:60000013 r6:eac81d8c r5:8516d400 r4:8516d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8516d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517fb00 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeac81fb0 to 0xeac81ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:437 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4228 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac8dd84 r8:00000002 r7:60000013 r6:eac8dd8c r5:8516ec00 r4:8516ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8516ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517fe00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8516ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0693000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bd78c r4:851bd400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bd78c r4:85180900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8516ec00 r8:8518092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85180900 r8:8027ed34 r7:eac89e60 r6:85180980 r5:8516ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517fa80 INFO: task kworker/1:438:4228 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9b266000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:4229 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac85d84 r8:00000002 r7:60000013 r6:eac85d8c r5:85168000 r4:85168000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85168000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ffc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:851bdb8c r4:85180a00 r10:61c88647 r9:85168000 r8:85180a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 9b266000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4232 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac91d84 r8:00000002 r7:60000113 r6:eac91d8c r5:85170000 r4:85170000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85170000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85170000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851be38c r4:851be000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851be38c r4:85180b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85170000 r8:85180b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4233 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac99d84 r8:00000002 r7:60000013 r6:eac99d8c r5:85170c00 r4:85170c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85170c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84da4cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bdf8c r4:851bdc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bdf8c r4:85180c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85170c00 r8:85180c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85180c00 r8:8027ed34 r7:eac91e60 r6:85180c80 r5:85170c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f080 INFO: task kworker/1:441:4233 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d20: 9b6f3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4236 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac9dd84 r8:00000002 r7:60000013 r6:eac9dd8c r5:85171800 r4:85171800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85171800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85171800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a01000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851beb8c r4:851be800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851beb8c r4:85180d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85171800 r8:85180d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85180d00 r8:8027ed34 r7:eac91e60 r6:85180d80 r5:85171800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f240 INFO: task kworker/1:442:4236 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9b917000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:4237 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:85172400 r4:85172400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85172400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85172400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49cf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851be78c r4:851be400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851be78c r4:85180e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85172400 r8:85180e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85180e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85180e00 r8:8027ed34 r7:eac9de60 r6:85180e80 r5:85172400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f240 INFO: task kworker/1:443:4237 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eaca5d84 r8:00000002 r7:60000013 r6:eaca5d8c r5:85173000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851bef8c r4:851bec00 r10:61c88647 r9:85173000 r8:85180f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 9ba37000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e9178c r4:85e91400 r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918644 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:85173c00 r4:85173c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85173c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bf38c r4:851bf000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bf38c r4:8519b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85173c00 r8:8519b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519b000 r8:8027ed34 r7:eaca5e60 r6:8519b080 r5:85173c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f440 INFO: task kworker/1:445:4241 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9be27000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4244 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8519b100 r8:8027ed34 r7:eac95e60 r6:8519b180 r5:85174800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e9178c r4:85e91400 r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85175400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a7b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bf78c r4:851bf400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bf78c r4:8519b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85175400 r8:8519b22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519b200 r8:8027ed34 r7:eaca9e60 r6:8519b280 r5:85175400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacadfb0 to 0xeacadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f6c0 INFO: task kworker/1:447:4245 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9c107000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85176000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8519b300 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:449 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918644 r9:eacbdd84 r8:00000002 r7:60000113 r6:eacbdd8c r5:851f8000 r4:851f8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851f8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518fe40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c838c r4:851c8000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c838c r4:8519b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f8000 r8:8519b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519b400 r8:8027ed34 r7:eaca9e60 r6:8519b480 r5:851f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518fb00 INFO: task kworker/1:449:4251 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9c8fd000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4252 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eacb9d84 r8:00000002 r7:60000013 r6:eacb9d8c r5:851f8c00 r4:851f8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeacb9fb0 to 0xeacb9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:850d6f8c r4:841de000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fa400 r8:841de02c r7:82804d40 r6:dddced40 r5:dddced60 r4:841de000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841de000 r8:8027ed34 r7:e0969e60 r6:8519b680 r5:851fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851917c0 INFO: task kworker/0:119:4253 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9ca17000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4255 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:851fb000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eace9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eacc1000 r10:61c88647 r9:84cbc800 r8:8519b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2040 INFO: task kworker/1:452:4256 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9d05c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4259 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eace1d84 r8:00000002 r7:60000013 r6:eace1d8c r5:84cba400 r4:84cba400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cba400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c8f8c r4:851c8c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c8f8c r4:8519b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cba400 r8:8519b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519b800 r8:8027ed34 r7:eacc9e60 r6:851a8080 r5:84cba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a20c0 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c938c r4:851c9000 r10:00000000 r9:8519b880 r8:8027ed34 r7:eacc9e60 r6:851a8100 r5:84cbd400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9d47a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4263 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eacfdd84 r8:00000002 r7:60000013 r6:eacfdd8c r5:84cbec00 r4:84cbec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cbec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacfde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cbec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c9b8c r4:851c9800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c9b8c r4:8519b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cbec00 r8:8519b92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519b900 r8:8027ed34 r7:eacc9e60 r6:851a8180 r5:84cbec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacfdfb0 to 0xeacfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2180 INFO: task kworker/1:455:4263 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:456 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:851ca78c r4:8519b980 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:4267 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:84cbb000 r4:84cbb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cbb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cbb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead05000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c9f8c r4:851c9c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c9f8c r4:8519ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8519ba00 r8:8027ed34 r7:ead15e60 r6:851a8280 r5:84cbb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:851f9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ead11000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:851fc800 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2e00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851caf8c r4:851cac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851caf8c r4:8519bb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fc800 r8:8519bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519bb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519bb80 r8:8027ed34 r7:ead15e60 r6:8519bc00 r5:851fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2900 INFO: task kworker/1:459:4271 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9d945000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4272 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:851fd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeacf9fb0 to 0xeacf9ff8) r4:851a2900 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4275 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:851fec00 r4:851fec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851fec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cb38c r4:851cb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cb38c r4:8519bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fec00 r8:8519bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519bd80 r8:8027ed34 r7:ead19e60 r6:8519be00 r5:851fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead41fb0 to 0xead41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2c80 INFO: task kworker/1:461:4275 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9dfaa000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfa9b000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cb78c r4:851cb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cb78c r4:8519be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fbc00 r8:8519beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8519be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519be80 r8:8027ed34 r7:ead41e60 r6:8519bf00 r5:851fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2e80 INFO: task kworker/1:462:4277 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9e09c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:851fe000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 9e09c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e9178c r4:85e91400 r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:85200000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851af180 INFO: task kworker/1:464:4281 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9e5f0000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:4284 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:85200c00 r4:85200c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85200c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85200c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cbf8c r4:851cbc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cbf8c r4:851b4180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85200c00 r8:851b41ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b4180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4180 r8:8027ed34 r7:e08d1e60 r6:851b4200 r5:85200c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851af400 INFO: task kworker/1:465:4284 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 5d60: 80070013 ffffffff r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85201800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85201800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffed000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d4b8c r4:851d4800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d4b8c r4:851b4280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85201800 r8:851b42ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b4280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4280 r8:8027ed34 r7:e08d1e60 r6:851b4300 r5:85201800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851af480 INFO: task kworker/1:466:4285 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9e9ef000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dff3b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:468 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851afb00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85203000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d4f8c r4:851d4c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d4f8c r4:851b4480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85203000 r8:851b44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b4480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4480 r8:8027ed34 r7:eabede60 r6:851b4500 r5:85203000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851af800 INFO: task kworker/1:468:4290 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9eeaa000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85203c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851afe00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85203c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0149000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d578c r4:851d5400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d578c r4:851b4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85203c00 r8:851b45ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4580 r8:8027ed34 r7:eac39e60 r6:851b4600 r5:85203c00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80070013 ffffffff [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85205400 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851afcc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85205400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d538c r4:851d5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d538c r4:851b4680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85205400 r8:851b46ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b4680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4680 r8:8027ed34 r7:eac29e60 r6:851b4700 r5:85205400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:851afc80 5d20: 9f215000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r5:85e9178c r4:85e91400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xeac51fb0 to 0xeac51ff8) [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851afc80 INFO: task kworker/1:472:4297 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: 9f771000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r5:00001000 r4:e01f9000 Exception stack(0xeac69fb0 to 0xeac69ff8) 5d20: 9fcff000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000001 Not tainted 6.16.0-rc1-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r10:61c88647 r9:8520a400 r8:851b4aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a1180 INFO: task kworker/1:474:4301 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: a01ff000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:85e9178c r4:85e91400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:851b4b00 r8:8027ed34 r7:eac51e60 r6:851a8380 r5:85176c00 5d20: a01ff000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84da7100 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cbbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0785000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d6f8c r4:851d6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d6f8c r4:851b4b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cbbc00 r8:851b4bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b4b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4b80 r8:8027ed34 r7:ead4de60 r6:851a8400 r5:84cbbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a1440 INFO: task kworker/1:476:4305 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:477:4307 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:478 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:851b4c80 r8:8027ed34 r7:ead55e60 r6:851a8500 r5:83b01800 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:4311 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:4311 tgid:4311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eac3dd84 r8:00000002 r7:60000013 r6:eac3dd8c r5:84cc1800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 r10:61c88647 r9:84cc1800 r8:851b4d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4313 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead61d84 r8:00000002 r7:60000013 r6:ead61d8c r5:84cf8000 r4:84cf8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.16.0-rc1-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r5:00001000 r4:e0949000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a19c0 INFO: task kworker/1:481:4317 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 INFO: task kworker/0:120:4318 blocked for more than 456 seconds. [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cf9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85191cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e499d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dc78c r4:851dc400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dc78c r4:851b4e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cfa400 r8:851b4eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851b4e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4e80 r8:8027ed34 r7:ead5de60 r6:851a8800 r5:84cfa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:4323 blocked for more than 456 seconds. task:kworker/1:483 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:121 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead75d84 r8:00000002 r7:60000113 r6:ead75d8c r5:84cfbc00 r4:84cfbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cfbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d11280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cfbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r7:dddced40 r6:83018000 r5:8454038c r4:851a8900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d20: a209a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r5:00001000 r4:edc47000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:4325 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead79d84 r8:00000002 r7:60000013 r6:ead79d8c r5:84cfc800 r4:84cfc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cfc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:484:4325 is blocked on a mutex likely owned by task kworker/1:311:3883. r4:82ac11e4 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4328 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead85d84 r8:00000002 r7:60000013 r6:ead85d8c r5:84cfec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r5:00001000 r4:eac03000 r4:00000001 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4330 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4330 tgid:4330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918644 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:84e40c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d68080 r8:8027ed34 r7:ead85e60 r6:851a8b00 r5:84e40c00 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 INFO: task kworker/1:487:4331 blocked for more than 456 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b5580 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84da7100 r5:84e43000 r4:82918640 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b5740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e43000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ddb8c r4:851dd800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ddb8c r4:84d68180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e43000 r8:84d681ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d68180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d68180 r8:8027ed34 r7:ead85e60 r6:851a8c00 r5:84e43000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:00000001 INFO: task kworker/1:489:4336 blocked for more than 456 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r5:00001000 r4:dfc85000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:122:4337 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:122 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:851a8d00 r8:8027ed34 r7:ead75e60 r6:851a8d80 r5:84e40000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84da7100 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 r10:61c88647 r9:84e44800 r8:84d682ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:84e45400 r4:84e45400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e45400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b5e40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e45400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfddb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851def8c r4:851dec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851def8c r4:84d68300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e45400 r8:84d6832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d68300 1fa0: 00000000 00000000 00000000 00000000 5d60: 80070013 ffffffff [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.16.0-rc1-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r10:61c88647 r9:84e46000 r8:851a8eac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: a3d78000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84e46c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:492:4346 is blocked on a mutex likely owned by task kworker/1:311:3883. r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r5:00001000 r4:e0109000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5d20: a4094000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:4350 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:4350 tgid:4350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eadadd84 r8:00000002 r7:60000013 r6:eadadd8c r5:84cfe000 r4:84cfe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cfe000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b5f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851df38c r4:851df000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851df38c r4:84d68480 r10:61c88647 r9:84cfe000 r8:84d684ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:842a9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 r10:61c88647 r9:842a9800 r8:84d685ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85e9178c r4:85e91400 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:497:4356 is blocked on a mutex likely owned by task kworker/1:311:3883. [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:498:4358 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4358 tgid:4358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:8520b000 r4:8520b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85024040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8520b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 5d20: a4b4b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r5:85e9178c r4:85e91400 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r5:00001000 r4:e06a7000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5d20: a4b4b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:500:4362 blocked for more than 457 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850244c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8520c800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0611000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e0b8c r4:851e0800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e0b8c r4:84d68880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520c800 r8:84d688ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d68880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d68880 r8:8027ed34 r7:eadc5e60 r6:84d68900 r5:8520c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85024240 INFO: task kworker/1:500:4362 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: a52a5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:501 state:D stack:0 pid:4364 tgid:4364 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:84d68980 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r9:83018205 r8:8520e000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e138c r4:851e1000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e138c r4:84d68a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520e000 r8:84d68aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d68a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d68a80 r8:8027ed34 r7:eadc5e60 r6:84d68b00 r5:8520e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85024640 INFO: task kworker/1:502:4367 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:84d84680 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.16.0-rc1-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: a5740000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:4372 blocked for more than 457 seconds. [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:84d68d80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:edc47000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82918644 r9:eadedd84 r8:00000002 r7:60000113 r6:eadedd8c r5:85210c00 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d113c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85210c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453bf8c r4:8453bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8453bf8c r4:85127300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85210c00 r8:8512732c r7:82804d40 r6:dddced40 r5:dddced60 r4:85127300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127300 r8:8027ed34 r7:ead75e60 r6:84d68e80 r5:85210c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadedfb0 to 0xeadedff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08 r9:83018005 r8:85212400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r10:61c88647 r9:85212400 r8:851273ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85127380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127380 r8:8027ed34 r7:eadede60 r6:84d68f00 r5:85212400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf5fb0 to 0xeadf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d11240 INFO: task kworker/0:125:4378 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db12c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85210000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa9d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e238c r4:851e2000 r4:84d68f80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:126:4380 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:126 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85213000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 r10:61c88647 r9:85213000 r8:8512742c r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 r9:83018005 r8:85211800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:4385 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918644 r9:eae01d84 r8:00000002 r7:60000013 r6:eae01d8c r5:85214800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:509 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae09d84 r8:00000002 r7:60000013 r6:eae09d8c r5:85216000 r4:85216000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85216000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db1800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85216000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e338c r4:851e3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e338c r4:84f24380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84f243ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84da7100 r10:82918644 r9:eae15d84 r8:00000002 r7:60000013 r6:eae15d8c r5:842abc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db1980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e378c r4:851e3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e378c r4:84f24480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842abc00 r8:84f244ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84f24480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f24480 r8:8027ed34 r7:eae09e60 r6:85127500 r5:842abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db1600 INFO: task kworker/1:510:4391 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 INFO: task kworker/1:511:4393 blocked for more than 457 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r9:83018205 r8:842ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db1780 INFO: task kworker/1:511:4393 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db1f40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ec78c r4:851ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ec78c r4:84f24580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842ad400 r8:84f245ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84f24580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f24580 r8:8027ed34 r7:eae1de60 r6:85127600 r5:842ad400 1fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:84f24600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db1940 INFO: task kworker/1:513:4396 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: a7f4f000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 INFO: task kworker/1:514:4398 is blocked on a mutex likely owned by task kworker/1:311:3883. [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:61c88647 r9:842ae000 r8:851277ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85127780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127780 r8:8027ed34 r7:eadf5e60 r6:85127800 r5:842ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d11e80 INFO: task kworker/0:128:4400 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: a8763000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:00000000 r5:85e9178c r4:85e91400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db1b40 Exception stack(0xeae35fb0 to 0xeae35ff8) r4:00000000 r4:00000000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:851ed38c r4:851ed000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:4407 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84c02400 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85009040 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:84c00000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85009200 INFO: task kworker/1:518:4410 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:519 state:D stack:0 pid:4412 tgid:4412 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:84f24900 r4:85009280 5d60: 80070013 ffffffff r5:00001000 r4:edc47000 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:4416 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae59d84 r8:00000002 r7:60000113 r6:eae59d8c r5:84c05400 r4:84c05400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c05400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84d414c0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae5dd84 r8:00000002 r7:60000113 r6:eae5dd8c r5:84c06c00 r4:84c06c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c06c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0897000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eeb8c r4:851ee800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851eeb8c r4:84f24a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c06c00 r8:84f24aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84f24a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f24a80 r8:8027ed34 r7:eae55e60 r6:85127d00 r5:84c06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae5dfb0 to 0xeae5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85009680 INFO: task kworker/1:522:4420 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r4:00000000 r5:85e9178c r4:85e91400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e071f000 1fa0: 00000000 00000000 00000000 00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:4423 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:84cfd400 r4:84cfd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cfd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:130:4426 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e498b000 r4:00000001 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c28000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08e3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eef8c r4:851eec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851eef8c r4:84f24c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85009a40 r4:82ac11e4 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) Exception stack(0xe07e5fb0 to 0xe07e5ff8) Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:84c2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 5fa0: 00000000 00000000 00000000 00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4432 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae79d84 r8:00000002 r7:60000013 r6:eae79d8c r5:84c28c00 r4:84c28c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:61c88647 r9:84c28c00 r8:84f24d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80070013 ffffffff [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:84c2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ef78c r4:851ef400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ef78c r4:84f24d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c2b000 r8:84f24dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84f24d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f24d80 r8:8027ed34 r7:eae79e60 r6:84d80000 r5:84c2b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae7dfb0 to 0xeae7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85009dc0 INFO: task kworker/1:528:4434 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ac7b2000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:84c2bc00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84c2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 r10:61c88647 r9:84c2bc00 r8:84f24e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:131 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85235f8c r4:85235c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85235f8c r4:84d80100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c2c800 r8:84d8012c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d80100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d80100 r8:8027ed34 r7:eadf5e60 r6:84d80180 r5:84c2c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae71fb0 to 0xeae71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85024e80 INFO: task kworker/0:131:4439 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: acd97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:132 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84c2d400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc4d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85236b8c r4:85236800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85236b8c r4:84d80200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c2d400 r8:84d8022c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d80200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d80200 r8:8027ed34 r7:eadf5e60 r6:84d80280 r5:84c2d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead89fb0 to 0xead89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85024e80 INFO: task kworker/0:132:4441 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: acd97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:4442 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:84c2e000 r4:84c2e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c2e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d39340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851f038c r4:851f0000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d39480 r5:851f078c r4:851f0400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:4446 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae8dd84 r8:00000002 r7:60000013 r6:eae8dd8c r5:84c29800 r4:84c29800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c29800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d39600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c29800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f0b8c r4:851f0800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f0b8c r4:84f24f80 r4:84f24f80 Exception stack(0xeae8dfb0 to 0xeae8dff8) r4:84d39300 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e9178c r4:85e91400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:4450 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae95d84 r8:00000002 r7:60000113 r6:eae95d8c r5:84c08c00 r4:84c08c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c08c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d39880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead21000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f138c r4:851f1000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f138c r4:85023080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c08c00 r8:850230ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023080 r8:8027ed34 r7:eae91e60 r6:84d80500 r5:84c08c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d393c0 INFO: task kworker/1:534:4450 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ae392000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4452 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae99d84 r8:00000002 r7:60000013 r6:eae99d8c r5:84c09800 r4:84c09800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ae392000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4453 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae9dd84 r8:00000002 r7:60000013 r6:eae9dd8c r5:84c0a400 r4:84c0a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c0a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d39a00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f178c r4:851f1400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f178c r4:85023180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c0a400 r8:850231ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023180 r8:8027ed34 r7:eae99e60 r6:84d80600 r5:84c0a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae9dfb0 to 0xeae9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d39540 INFO: task kworker/1:536:4453 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: aecce000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:537 state:D stack:0 pid:4456 tgid:4456 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85023200 r8:8027ed34 r7:eae99e60 r6:84d80680 r5:84c0b000 r4:84d39a80 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4459 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4459 tgid:4459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaeb9d84 r8:00000002 r7:60000013 r6:eaeb9d8c r5:84c0d400 r4:84c0d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c0d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa11000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f1f8c r4:851f1c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f1f8c r4:85023280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c0d400 r8:850232ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023280 r8:8027ed34 r7:eaea5e60 r6:84d80700 r5:84c0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d399c0 INFO: task kworker/1:538:4459 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:539 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d39bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f238c r4:851f2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f238c r4:85023300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c0bc00 r8:8502332c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023300 r8:8027ed34 r7:eaeb9e60 r6:84d80780 r5:84c0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d39800 INFO: task kworker/1:539:4460 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: af23d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eaec9d84 r8:00000002 r7:60000113 r6:eaec9d8c r5:84c0e000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d81d80 r5:8523738c r4:85237000 r4:84d80800 Exception stack(0xeaec9fb0 to 0xeaec9ff8) r4:84d81a40 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: af23d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:4467 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae6dd84 r8:00000002 r7:60000013 r6:eae6dd8c r5:84c0ec00 r4:84c0ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c0ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d80900 r8:8027ed34 r7:eaec9e60 r6:84d80980 r5:84c0ec00 r4:84d81a40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: afb95000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:4470 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/1:540 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:84c0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 r10:61c88647 r9:84c0c800 r8:850233ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:4471 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:84678000 r4:84678000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84678000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84678000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa89000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f338c r4:851f3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f338c r4:85023400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84678000 r8:8502342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023400 r8:8027ed34 r7:eaecde60 r6:84d80a80 r5:84678000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d39900 INFO: task kworker/1:541:4471 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: afe46000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:4472 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaed9d84 r8:00000002 r7:60000113 r6:eaed9d8c r5:84678c00 r4:84678c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84678c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d80b00 r8:8027ed34 r7:eae6de60 r6:84d80b80 r5:84678c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d39ec0 INFO: task kworker/1:542:4474 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b0c15000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:4476 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaeddd84 r8:00000002 r7:60000013 r6:eaeddd8c r5:8467a400 r4:8467a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8467a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d38040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8467a400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05af000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85237f8c r4:85237c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85237f8c r4:84d80c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8467a400 r8:84d80cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d80c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d80c80 r8:8027ed34 r7:eaed9e60 r6:84d80d00 r5:8467a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeddfb0 to 0xeaeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84d38080 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b0c15000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:4477 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaee5d84 r8:00000002 r7:60000013 r6:eaee5d8c r5:85213c00 r4:85213c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85213c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d38500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85213c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84540b8c r4:84540800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84540b8c r4:84d80d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213c00 r8:84d80dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d80d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eaee9d84 r8:00000002 r7:60000013 r6:eaee9d8c r5:85204800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d38300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85204800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05df000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84540f8c r4:84540c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84540f8c r4:84d80e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85204800 r8:84d80e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d80e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d80e00 r8:8027ed34 r7:eaee5e60 r6:85023580 r5:85204800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d38240 INFO: task kworker/0:138:4478 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b1179000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:139:4481 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:85209800 r4:85209800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85209800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d38a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85209800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a29000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85250b8c r4:85250800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85250b8c r4:84d80e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85209800 r8:84d80eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d80e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d80e80 r8:8027ed34 r7:eaee5e60 r6:85023600 r5:85209800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d38380 INFO: task kworker/0:139:4481 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:edc47000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:543 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85218000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85218000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49c2000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f2f8c r4:851f2c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f2f8c r4:85023680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218000 r8:850236ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023680 r8:8027ed34 r7:eaed1e60 r6:85023700 r5:85218000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed1c0 INFO: task kworker/1:543:4483 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b1896000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:4484 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:85218c00 r4:85218c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85218c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d38740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0695000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525038c r4:85250000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525038c r4:84d80f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218c00 r8:84d80f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84d80f00 r8:8027ed34 r7:eaeede60 r6:85023780 r5:85218c00 r4:84d38240 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:141:4486 blocked for more than 458 seconds. r4:85219800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8525078c r4:85250400 r10:61c88647 r9:85219800 r8:84d80fac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b223c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:4489 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaef1d84 r8:00000002 r7:60000013 r6:eaef1d8c r5:8521a400 r4:8521a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d38b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521a400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a5f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85250f8c r4:85250c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85250f8c r4:85132000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521a400 r8:8513202c r7:82804d40 r6:dddced40 r5:dddced60 r4:85132000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132000 r8:8027ed34 r7:eaeede60 r6:85023880 r5:8521a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d387c0 INFO: task kworker/0:142:4489 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b223c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:4491 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:8521b000 r4:8521b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d38bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525178c r4:85251400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525178c r4:85132080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521b000 r8:851320ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85132080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132080 r8:8027ed34 r7:eaef1e60 r6:85023900 r5:8521b000 Exception stack(0xeaf01fb0 to 0xeaf01ff8) r4:84d38b40 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:85e9178c r4:85e91400 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8521bc00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8521bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525138c r4:85251000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525138c r4:85023980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521bc00 r8:850239ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023980 r8:8027ed34 r7:eaed1e60 r6:85023a00 r5:8521bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed6c0 INFO: task kworker/1:544:4494 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b24ac000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8521c800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f3b8c r4:851f3800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f3b8c r4:85023a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521c800 r8:85023aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023a80 r8:8027ed34 r7:eaefde60 r6:85023b00 r5:8521c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed6c0 INFO: task kworker/1:545:4495 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b2a1e000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:4496 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918644 r9:eaf05d84 r8:00000002 r7:60000113 r6:eaf05d8c r5:8521d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85132100 r8:8027ed34 r7:eaf01e60 r6:85023b80 r5:8521d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe07e5d20 to 0xe07e5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:546:4499 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf0dd84 r8:00000002 r7:60000113 r6:eaf0dd8c r5:8521e000 r4:8521e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847edb80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8521e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f378c r4:851f3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f378c r4:85023c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521e000 r8:85023c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023c00 r8:8027ed34 r7:eaf09e60 r6:85023c80 r5:8521e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847eda00 INFO: task kworker/1:546:4499 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b3189000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:4500 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8521ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85023d00 r8:8027ed34 r7:eaf09e60 r6:85023d80 r5:8521ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:4502 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:84ed0000 r4:84ed0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ed0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d814c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ed0000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85251f8c r4:85251c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85251f8c r4:85132180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed0000 r8:851321ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85132180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132180 r8:8027ed34 r7:eaf05e60 r6:85023e00 r5:84ed0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf19fb0 to 0xeaf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d38e40 INFO: task kworker/0:145:4502 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b3b21000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85023e80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:4509 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf21d84 r8:00000002 r7:60000013 r6:eaf21d8c r5:84ed1800 r4:84ed1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ed1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ed1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb01000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f3f8c r4:851f3c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f3f8c r4:85023f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed1800 r8:85023fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85023f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85023f80 r8:8027ed34 r7:eaf11e60 r6:8526f000 r5:84ed1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526c1c0 INFO: task kworker/1:549:4509 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b40d3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08 r9:83018205 r8:84ed2400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:4513 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae41d84 r8:00000002 r7:60000113 r6:eae41d8c r5:84ed3000 r4:84ed3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ed3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:852b538c r4:8526f180 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:84ed3c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0059000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b4913000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:4516 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:84ed4800 r4:84ed4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ed4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85278b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ed4800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525238c r4:85252000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525238c r4:85132200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed4800 r8:8513222c r7:82804d40 r6:dddced40 r5:dddced60 r4:85132200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaf1dfb0 to 0xeaf1dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8526f400 r8:8027ed34 r7:eae41e60 r6:8526f480 r5:84ed5400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf25d84 r8:00000002 r7:60000113 r6:eaf25d8c r5:84ed6000 r4:84ed6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ed6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ed6000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b578c r4:852b5400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b578c r4:8526f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed6000 r8:8526f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8526f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526f500 r8:8027ed34 r7:eae41e60 r6:8526f580 r5:84ed6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf25fb0 to 0xeaf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526c800 INFO: task kworker/1:554:4520 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b5564000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4522 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf29d84 r8:00000002 r7:60000013 r6:eaf29d8c r5:84ed6c00 r4:84ed6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ed6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8526f600 r8:8027ed34 r7:eaf25e60 r6:8526f680 r5:84ed6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r5:85e9178c r4:85e91400 r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 INFO: task kworker/1:556:4523 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:84c10000 r4:84c10000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c10000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ce40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c10000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0733000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b5b8c r4:852b5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b5b8c r4:8526f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c10000 r8:8526f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8526f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526f700 r8:8027ed34 r7:eaf29e60 r6:8526f780 r5:84c10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526ca80 INFO: task kworker/1:556:4523 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b5d97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4527 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf2dd84 r8:00000002 r7:60000113 r6:eaf2dd8c r5:84c10c00 r4:84c10c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf2de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8526f800 r8:8027ed34 r7:eaf29e60 r6:8526f880 r5:84c10c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b5d97000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4528 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf39d84 r8:00000002 r7:60000013 r6:eaf39d8c r5:84c11800 r4:84c11800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c11800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84c11800 r8:8526f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: b6343000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08 r4:00000000 r5:00001000 r4:e08f5000 r10:61c88647 r9:84c12400 r8:8526fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 task:kworker/1:560 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c13000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e095d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b6f8c r4:852b6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b6f8c r4:8526fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c13000 r8:8526fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8526fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526fb00 r8:8027ed34 r7:eaf39e60 r6:8526fb80 r5:84c13000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf41fb0 to 0xeaf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85287040 INFO: task kworker/1:560:4532 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b668d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4535 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4535 tgid:4535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:84c14800 r4:84c14800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c14800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c14800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49c7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84c14800 r8:8526fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:562:4536 blocked for more than 458 seconds. r10:82918644 r9:eaf49d84 r8:00000002 r7:60000113 r6:eaf49d8c r5:84c15400 r4:84c15400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c15400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c15400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab41000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b778c r4:852b7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b778c r4:8526fd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c15400 r8:8526fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8526fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526fd00 r8:8027ed34 r7:eaf35e60 r6:8526fd80 r5:84c15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852872c0 INFO: task kworker/1:562:4536 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b6b83000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84c16000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84c16000 r8:8526fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: b6b83000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84da7100 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eaf51d84 r8:00000002 r7:60000013 r6:eaf51d8c r5:84c13c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c13c00 r8:8526ff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8526ff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526ff00 r8:8027ed34 r7:eaf4de60 r6:8526ff80 r5:84c13c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85287680 INFO: task kworker/1:564:4539 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b6b83000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:4541 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf55d84 r8:00000002 r7:60000013 r6:eaf55d8c r5:852e8000 r4:852e8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b7f8c r4:852b7c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b7f8c r4:8528e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8000 r8:8528e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8528e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8528e000 r8:8027ed34 r7:eaf4de60 r6:8528e080 r5:852e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85287680 INFO: task kworker/1:565:4541 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b70f6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85278dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead03000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85252b8c r4:85252800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85252b8c r4:85132280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ea400 r8:851322ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85132280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132280 r8:8027ed34 r7:eaf05e60 r6:8528e100 r5:852ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf61fb0 to 0xeaf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85278a80 INFO: task kworker/0:147:4543 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b70f6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:852eb000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb119000 r10:61c88647 r9:852eb000 r8:8513232c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: b7744000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918644 r9:eaf6dd84 r8:00000002 r7:60000113 r6:eaf6dd8c r5:852e9800 r4:852e9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a3600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525338c r4:85253000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525338c r4:85132380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e9800 r8:851323ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85132380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132380 r8:8027ed34 r7:eaf69e60 r6:8528e200 r5:852e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85278c40 INFO: task kworker/0:149:4547 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b7744000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:4549 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf71d84 r8:00000002 r7:60000113 r6:eaf71d8c r5:852e8c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852c438c r4:852c4000 r4:8528e280 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: b7923000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:567 state:D stack:0 pid:4552 tgid:4552 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c478c r4:852c4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c478c r4:8528e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ec800 r8:8528e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8528e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8528e380 r8:8027ed34 r7:eaf4de60 r6:8528e400 r5:852ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a1c0 INFO: task kworker/1:567:4552 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b7b88000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:4554 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:852ed400 r4:852ed400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ed400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a440 r7:ddde2d40 r6:83018200 r5:852c4f8c r4:8528e580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a100 INFO: task kworker/1:569:4555 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b7f28000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4558 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf79d84 r8:00000002 r7:60000013 r6:eaf79d8c r5:852eec00 r4:852eec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852eec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 r5:00001000 r4:eae45000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:852ebc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ebc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c5b8c r4:852c5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c5b8c r4:8528e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ebc00 r8:8528e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8528e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8528e780 r8:8027ed34 r7:eaf79e60 r6:8528e800 r5:852ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a580 INFO: task kworker/1:571:4560 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b82b6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:84c16c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852c5f8c r4:852c5c00 r4:8528e880 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:4564 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaf8dd84 r8:00000002 r7:60000113 r6:eaf8dd8c r5:85220000 r4:85220000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85220000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528abc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85220000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf95000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c638c r4:852c6000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c638c r4:8528e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85220000 r8:8528e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8528e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8528e980 r8:8027ed34 r7:eaf81e60 r6:8528ea00 r5:85220000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a900 INFO: task kworker/1:573:4564 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b876b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eafad000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528aa40 INFO: task kworker/1:574:4566 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b8aa8000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:4567 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eafa5d84 r8:00000002 r7:60000013 r6:eafa5d8c r5:85221800 r4:85221800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85221800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528ad40 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85221800 r8:8528ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8528ec80 r8:8027ed34 r7:eaf99e60 r6:8528ed00 r5:85222400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b8df9000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:4571 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:4571 tgid:4571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eafc1d84 r8:00000002 r7:60000013 r6:eafc1d8c r5:85223000 r4:85223000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847edf80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85223000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c6f8c r4:852c6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c6f8c r4:8528ed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223000 r8:8528edac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8528ed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8528ed80 r8:8027ed34 r7:eafb1e60 r6:8528ee00 r5:85223000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) INFO: task kworker/1:578:4575 blocked for more than 458 seconds. r10:82918644 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:8467ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8467ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c778c r4:852c7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c778c r4:8528ee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8467ec00 r8:8528eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8528ee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8528ee80 r8:8027ed34 r7:eafb1e60 r6:85132400 r5:8467ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529d1c0 INFO: task kworker/1:578:4575 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b9527000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:eafedd84 r8:00000002 r7:60000013 r6:eafedd8c r5:8467d400 r4:8467d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8467d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8467d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c8b8c r4:852c8800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c8b8c r4:8528ef00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8467d400 r8:8528ef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8528ef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8528ef00 r8:8027ed34 r7:eafe9e60 r6:85132480 r5:8467d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529d100 INFO: task kworker/1:579:4576 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b9527000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852c7b8c r4:852c7800 r10:61c88647 r9:8467c800 r8:8528efac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d580 r5:852c7f8c r4:852c7c00 r7:ddde2d40 r6:83018200 r5:852c7f8c r4:8529f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8467e000 r8:8529f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529f000 r8:8027ed34 r7:eafede60 r6:85132580 r5:8467e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529d300 INFO: task kworker/1:581:4579 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b96e4000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:4581 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:582 state:D stack:0 pid:4581 tgid:4581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb029d84 r8:00000002 r7:60000113 r6:eb029d8c r5:8467b000 r4:8467b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8467b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d6c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8467b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c838c r4:852c8000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8467b000 r8:8529f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e9178c r4:85e91400 r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d800 r5:852c878c r4:852c8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8467bc00 r8:8529f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529f100 r8:8027ed34 r7:eafede60 r6:85132680 r5:8467bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529d540 INFO: task kworker/1:583:4583 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: b9a47000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:4585 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:84c30c00 r4:84c30c00 r5:84c30c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:585:4587 blocked for more than 459 seconds. r10:82918644 r9:eb03dd84 r8:00000002 r7:60000013 r6:eb03dd8c r5:85224800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8529f200 Exception stack(0xeb03dfb0 to 0xeb03dff8) r4:8529d7c0 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:4590 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eafcdd84 r8:00000002 r7:60000013 r6:eafcdd8c r5:85226000 r4:85226000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85226000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529dec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85226000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb85000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c978c r4:852c9400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c978c r4:8529f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226000 r8:8529f32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529f300 r8:8027ed34 r7:eb04de60 r6:8529f380 r5:85226000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529da40 INFO: task kworker/1:586:4590 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ba336000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:4593 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb061d84 r8:00000002 r7:60000013 r6:eb061d8c r5:85223c00 r4:85223c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85278c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85223c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c9f8c r4:852c9c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c9f8c r4:8529f400 r10:00000000 r9:8529f400 r8:8027ed34 r7:eafcde60 r6:8529f480 r5:85223c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r5:85e9178c r4:85e91400 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:4597 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:4597 tgid:4597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:85225400 r4:85225400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85225400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85030380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85225400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cab8c r4:852ca800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852cab8c r4:8529f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85225400 r8:8529f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529f600 r8:8027ed34 r7:eb061e60 r6:8529f680 r5:85225400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529df40 INFO: task kworker/1:589:4597 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ba98d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:4599 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb069d84 r8:00000002 r7:60000013 r6:eb069d8c r5:85228000 r4:85228000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85228000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85287c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85228000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0039000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ca38c r4:852ca000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852ca38c r4:8529f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228000 r8:8529f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529f700 r8:8027ed34 r7:eb065e60 r6:8529f780 r5:85228000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847edfc0 INFO: task kworker/1:590:4599 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85228c00 r8:8529f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:8529f800 r8:8027ed34 r7:eb065e60 r6:8529f880 r5:85228c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850302c0 INFO: task kworker/1:591:4601 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bae5d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:4603 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb071d84 r8:00000002 r7:60000113 r6:eb071d8c r5:85229800 r4:85229800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85229800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85030540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85229800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852caf8c r4:852cac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852caf8c r4:8529f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85229800 r8:8529f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:8529f900 r8:8027ed34 r7:eb065e60 r6:8529f980 r5:85229800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:4605 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb075d84 r8:00000002 r7:60000013 r6:eb075d8c r5:8522a400 r4:8522a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852cb38c r4:852cb000 r10:00000000 r9:8529fa00 r8:8027ed34 r7:eb071e60 r6:8529fa80 r5:8522a400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:595:4609 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:4609 tgid:4609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb07dd84 r8:00000002 r7:60000013 r6:eb07dd8c r5:8522bc00 r4:8522bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85030980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49d1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cbb8c r4:852cb800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852cbb8c r4:8529fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522bc00 r8:8529fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529fc00 r8:8027ed34 r7:eb079e60 r6:8529fc80 r5:8522bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85030600 INFO: task kworker/1:595:4609 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bb636000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:4611 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb089d84 r8:00000002 r7:60000113 r6:eb089d8c r5:8522c800 r4:8522c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85030b40 r4:00000000 r5:00001000 r4:e8a4d000 r7:ddde2d40 r6:83018200 r5:852cbf8c r4:8529fd00 r4:8529fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529fd00 r8:8027ed34 r7:eb07de60 r6:8529fd80 r5:8522c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85030780 INFO: task kworker/1:596:4611 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bb7e3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.16.0-rc1-syzkaller #0 r4:8522d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab11000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d478c r4:852d4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d478c r4:8529fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522d400 r8:8529fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529fe00 r8:8027ed34 r7:eb089e60 r6:8529fe80 r5:8522d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850309c0 INFO: task kworker/1:597:4613 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 Exception stack(0xe07e5d20 to 0xe07e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8529ff00 r8:8027ed34 r7:eb09de60 r6:8529ff80 r5:8522e000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bc096000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:4620 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb0d5d84 r8:00000002 r7:60000113 r6:eb0d5d8c r5:852f0000 r4:852f0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e4580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525378c r4:85253400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525378c r4:85132780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f0000 r8:851327ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85132780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132780 r8:8027ed34 r7:eaf69e60 r6:84d93100 r5:852f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a35c0 INFO: task kworker/0:150:4620 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:600 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a53c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d538c r4:852d5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d538c r4:84d93180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f0c00 r8:84d931ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93180 r8:8027ed34 r7:eb0b1e60 r6:84d93200 r5:852f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a5180 INFO: task kworker/1:600:4622 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bc096000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 task:kworker/1:601 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:602 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d93380 r8:8027ed34 r7:eb0b5e60 r6:84d93400 r5:852f2400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:4627 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb0e9d84 r8:00000002 r7:60000013 r6:eb0e9d8c r5:852f3000 r4:852f3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d5b8c r4:852d5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d5b8c r4:84d93480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f3000 r8:84d934ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93480 r8:8027ed34 r7:eb0ede60 r6:84d93500 r5:852f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a52c0 INFO: task kworker/1:603:4627 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bc956000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eb0f5d84 r8:00000002 r7:60000013 r6:eb0f5d8c r5:852f3c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb0b7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:4631 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:852f4800 r4:852f4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb149000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d6f8c r4:852d6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d6f8c r4:84d93680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f4800 r8:84d936ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93680 r8:8027ed34 r7:eb0f5e60 r6:84d93700 r5:852f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a5700 INFO: task kworker/1:605:4631 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bc956000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d93780 r8:8027ed34 r7:eb0f9e60 r6:84d93800 r5:852f5400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r5:85e9178c r4:85e91400 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:4634 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:852f6000 r4:852f6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d678c r4:852d6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d678c r4:84d93880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f6000 r8:84d938ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93880 r8:8027ed34 r7:eb0f9e60 r6:84d93900 r5:852f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a58c0 INFO: task kworker/1:607:4634 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bd462000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:852f8000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:4638 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:4638 tgid:4638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:852fa400 r4:852fa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852fa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e47c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb125000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85253f8c r4:85253c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85253f8c r4:85132800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fa400 r8:8513282c r7:82804d40 r6:dddced40 r5:dddced60 r4:85132800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132800 r8:8027ed34 r7:eaf69e60 r6:84d93a80 r5:852fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e4480 INFO: task kworker/0:151:4638 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bd5a3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:4640 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb139d84 r8:00000002 r7:60000013 r6:eb139d8c r5:852f8c00 r4:852f8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b0b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85132880 Exception stack(0xeb139fb0 to 0xeb139ff8) r4:847e4700 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:153 state:D stack:0 pid:4642 tgid:4642 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0939000 r7:dddced40 r6:83018000 r5:8454178c r4:85132900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fbc00 r8:8513292c r7:82804d40 r6:dddced40 r5:dddced60 r4:85132900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85132900 r8:8027ed34 r7:eb139e60 r6:84d93b80 r5:852fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e4640 INFO: task kworker/0:153:4642 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bdd4c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:4645 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:852fc800 r4:852fc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852fc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb155fb0 to 0xeb155ff8) r4:847e6100 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:4648 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb169d84 r8:00000002 r7:60000013 r6:eb169d8c r5:84c33c00 r4:84c33c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c33c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e64c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d778c r4:852d7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d778c r4:84d93c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c33c00 r8:84d93cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93c80 r8:8027ed34 r7:eb155e60 r6:85132a00 r5:84c33c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e6240 INFO: task kworker/1:610:4648 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bdd4c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:4649 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb16dd84 r8:00000002 r7:60000113 r6:eb16dd8c r5:84c34800 r4:84c34800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c34800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c34800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb165000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d7b8c r4:852d7800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d7b8c r4:84d93d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c34800 r8:84d93d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93d00 r8:8027ed34 r7:eb169e60 r6:85132a80 r5:84c34800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e62c0 INFO: task kworker/1:611:4649 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: be1e5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:4651 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:84c35400 r4:84c35400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c35400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84c35400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 r7:ddde2d40 r6:83018200 r5:852e138c r4:84d93d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:4652 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:84c33000 r4:84c33000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c33000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e67c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c33000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb175000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d7f8c r4:852d7c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d7f8c r4:84d93e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c33000 r8:84d93e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93e00 r8:8027ed34 r7:eb17de60 r6:85132b80 r5:84c33000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e6440 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb189000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e038c r4:852e0000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852e038c r4:84d93e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c31800 r8:84d93eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93e80 r8:8027ed34 r7:eb17de60 r6:85132c00 r5:84c31800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e65c0 INFO: task kworker/1:614:4654 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: be6a3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:4656 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:84c36000 r4:84c36000 r5:84c36000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:00001000 r4:eb199000 r10:61c88647 r9:84c36000 r8:84d93f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d93f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d93f00 r8:8027ed34 r7:eb17de60 r6:85132c80 r5:84c36000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e6780 INFO: task kworker/1:615:4656 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bea1f000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:4659 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:84c36c00 r4:84c36c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c36c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c36c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:617 state:D stack:0 pid:4660 tgid:4660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb13dfb0 to 0xeb13dff8) r4:847e6b80 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:618 state:D stack:0 pid:4664 tgid:4664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:852fd400 r4:852fd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852fd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e238c r4:852e2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852e238c r4:84783100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fd400 r8:8478312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783100 r8:8027ed34 r7:eb17de60 r6:84783180 r5:852fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e6bc0 INFO: task kworker/1:618:4664 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bef58000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918644 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:852fe000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bf43b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:4667 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:4667 tgid:4667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb1e1d84 r8:00000002 r7:60000013 r6:eb1e1d8c r5:852fec00 r4:852fec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852fec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5d80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852e1b8c r4:852e1800 r4:84783300 Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) r4:851a5e80 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:621 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb1e9000 r10:61c88647 r9:852fb000 r8:8478342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:4671 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:852f6c00 r4:852f6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e278c r4:852e2400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852e278c r4:84783500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f6c00 r8:8478352c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783500 r8:8027ed34 r7:eb1b9e60 r6:84783580 r5:852f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a100 INFO: task kworker/1:622:4671 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bf4f0000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe07e5fb0 to 0xe07e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918644 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:85380000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8534838c r4:85348000 r10:00000000 r9:84783600 r8:8027ed34 r7:eb1f9e60 r6:84783680 r5:85380000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:4675 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:85380c00 r4:85380c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85380c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85380c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e2b8c r4:852e2800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852e2b8c r4:84783700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85380c00 r8:8478372c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783700 r8:8027ed34 r7:eb101e60 r6:84783780 r5:85380c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a400 INFO: task kworker/1:624:4675 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bf8ea000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:625 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb219000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a6c0 INFO: task kworker/1:625:4676 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: bfe16000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:626:4679 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb229d84 r8:00000002 r7:60000113 r6:eb229d8c r5:85382400 r4:85382400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85382400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85382400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb225000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e338c r4:852e3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852e338c r4:84783900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85382400 r8:8478392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783900 r8:8027ed34 r7:eb101e60 r6:84783980 r5:85382400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a700 INFO: task kworker/1:626:4679 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb24dd84 r8:00000002 r7:60000113 r6:eb24dd8c r5:84c30000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:4683 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:84c32400 r4:84c32400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c32400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518abc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c32400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e3b8c r4:852e3800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852e3b8c r4:84783a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c32400 r8:84783aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783a80 r8:8027ed34 r7:eb101e60 r6:85132e00 r5:84c32400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a880 INFO: task kworker/1:628:4683 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c0589000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:629 state:D stack:0 pid:4684 tgid:4684 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518adc0 r5:852e3f8c r4:852e3c00 r10:00000000 r9:84783b00 r8:8027ed34 r7:eb101e60 r6:85132e80 r5:85216c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:4687 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb271d84 r8:00000002 r7:60000013 r6:eb271d8c r5:84c58000 r4:84c58000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c58000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518afc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c58000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb269000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534878c r4:85348400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534878c r4:84783b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c58000 r8:84783bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783b80 r8:8027ed34 r7:eb101e60 r6:85132f00 r5:84c58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518acc0 INFO: task kworker/1:630:4687 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c09f7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534938c r4:85349000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534938c r4:84783c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c5a400 r8:84783c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783c00 r8:8027ed34 r7:eb271e60 r6:85132f80 r5:84c5a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb281fb0 to 0xeb281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ad40 INFO: task kworker/1:631:4689 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c0c9a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:632:4690 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:632 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb28dd84 r8:00000002 r7:60000013 r6:eb28dd8c r5:84c5b000 r4:84c5b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c5b000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84783c80 r8:8027ed34 r7:eb281e60 r6:847f2000 r5:84c5b000 r4:847e4300 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:633:4692 blocked for more than 459 seconds. r10:82918644 r9:eaf59d84 r8:00000002 r7:60000113 r6:eaf59d8c r5:84c58c00 r4:84c58c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c58c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534978c r4:85349400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534978c r4:84783d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c58c00 r8:84783d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783d00 r8:8027ed34 r7:eb281e60 r6:847f2080 r5:84c58c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf59fb0 to 0xeaf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518af40 INFO: task kworker/1:633:4692 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c106e000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:634:4696 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:634 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eaffdd84 r8:00000002 r7:60000013 r6:eaffdd8c r5:84c5d400 r4:84c5d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c5d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84783d80 r8:8027ed34 r7:eaf59e60 r6:847f2100 r5:84c5d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:84c5bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0073000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c1202000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:4699 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:4699 tgid:4699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb01dd84 r8:00000002 r7:60000013 r6:eb01dd8c r5:84c5ec00 r4:84c5ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c5ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e015b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85349f8c r4:85349c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85349f8c r4:84783e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c5ec00 r8:84783eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783e80 r8:8027ed34 r7:eaffde60 r6:847f2200 r5:84c5ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:637 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c59800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534a38c r4:8534a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534a38c r4:84783f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c59800 r8:84783f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783f00 r8:8027ed34 r7:eaffde60 r6:847f2280 r5:84c59800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d440 INFO: task kworker/1:637:4701 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c1565000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:638 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d7c0 r5:8534a78c r4:8534a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dc40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4989000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534b38c r4:8534b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534b38c r4:847c5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c48c00 r8:847c502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5000 r8:8027ed34 r7:eaffde60 r6:847f2380 r5:84c48c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d640 INFO: task kworker/1:639:4705 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c1b60000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:4707 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:84c49800 r4:84c49800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847c5080 r8:8027ed34 r7:eb2a1e60 r6:847f2400 r5:84c49800 r4:8517d9c0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c1b60000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:4709 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:84c4a400 r4:84c4a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c4a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dd40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534b78c r4:8534b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534b78c r4:847c5100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4a400 r8:847c512c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5100 r8:8027ed34 r7:eb2a1e60 r6:847f2480 r5:84c4a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb2a9d84 r8:00000002 r7:60000013 r6:eb2a9d8c r5:84c4b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dfc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabfd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534bf8c r4:8534bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534bf8c r4:847c5180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4b000 r8:847c51ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5180 r8:8027ed34 r7:eb29de60 r6:847f2500 r5:84c4b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517dbc0 INFO: task kworker/1:642:4713 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c21a5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:4714 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:4714 tgid:4714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:84c4bc00 r4:84c4bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c4bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517de80 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8534bb8c r4:847c5200 Exception stack(0xeb2adfb0 to 0xeb2adff8) r4:8517ddc0 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:644:4717 blocked for more than 460 seconds. r10:82918644 r9:eb2b5d84 r8:00000002 r7:60000013 r6:eb2b5d8c r5:84c4d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e4d040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534c38c r4:8534c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534c38c r4:847c5280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4d400 r8:847c52ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5280 r8:8027ed34 r7:eb2a9e60 r6:847f2600 r5:84c4d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e4d000 INFO: task kworker/1:644:4717 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c21a5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:84c4ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e4d780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c4ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534d38c r4:8534d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534d38c r4:847c5300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4ec00 r8:847c532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5300 r8:8027ed34 r7:eb2b5e60 r6:847f2680 r5:84c4ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e4d000 INFO: task kworker/1:645:4719 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c2753000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:4720 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85383c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e4d300 r5:8534c78c r4:8534c400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:647 state:D stack:0 pid:4723 tgid:4723 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ead39000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534cb8c r4:8534c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534cb8c r4:847c5480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85386000 r8:847c54ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5480 r8:8027ed34 r7:eb2bde60 r6:847c5500 r5:85386000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e4d340 INFO: task kworker/1:647:4723 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c2ada000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:4724 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85386c00 r4:85386c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85386c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e4d640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85386c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead99000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534cf8c r4:8534cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534cf8c r4:847c5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85386c00 r8:847c55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5580 r8:8027ed34 r7:eb2bde60 r6:847c5600 r5:85386c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e4d340 INFO: task kworker/1:648:4724 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c2ada000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:4727 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb211d84 r8:00000002 r7:60000013 r6:eb211d8c r5:85384800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb211e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae17000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:650 state:D stack:0 pid:4729 tgid:4729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2cdd84 r8:00000002 r7:60000113 r6:eb2cdd8c r5:85388000 r4:85388000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85388000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e4dbc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85388000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534db8c r4:8534d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534db8c r4:847c5780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85388000 r8:847c57ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5780 r8:8027ed34 r7:eb211e60 r6:847c5800 r5:85388000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e4d800 INFO: task kworker/1:650:4729 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c2e1c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:4730 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85388c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eafa9000 r7:ddde2d40 r6:83018200 r5:8534eb8c r4:847c5880 Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) r4:84e4d800 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847f2700 r8:8027ed34 r7:eb139e60 r6:847c5980 r5:85389800 r4:851b02c0 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:4733 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:652 state:D stack:0 pid:4733 tgid:4733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:8538b000 r4:8538b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e4de40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8538b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534df8c r4:8534dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534df8c r4:847c5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847c5a00 r8:8027ed34 r7:eb2d1e60 r6:847c5a80 r5:8538b000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:8538bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8534e38c r4:8534e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534e38c r4:847c5b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538bc00 r8:847c5b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5b00 r8:8027ed34 r7:eb2d1e60 r6:847c5b80 r5:8538bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e4dec0 INFO: task kworker/1:653:4736 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c3c4e000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:654 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:4740 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2e5d84 r8:00000002 r7:60000013 r6:eb2e5d8c r5:8538d400 r4:8538d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8538d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534f78c r4:8534f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534f78c r4:847c5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538d400 r8:847c5d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c5d00 r8:8027ed34 r7:eb2d1e60 r6:847c5d80 r5:8538d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517dec0 INFO: task kworker/1:655:4740 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c3f02000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:656 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847c5e00 r8:8027ed34 r7:eb2e5e60 r6:847c5e80 r5:8538e000 r4:85197040 INFO: task kworker/1:656:4741 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c440c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:4744 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2e9d84 r8:00000002 r7:60000113 r6:eb2e9d8c r5:8538ec00 r4:8538ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538ec00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847c5f00 r8:8027ed34 r7:eb2e5e60 r6:847c5f80 r5:8538ec00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eafef000 r5:8534fb8c r4:8534f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534fb8c r4:85187000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4e000 r8:8518702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85187000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187000 r8:8027ed34 r7:eb2e5e60 r6:847f2780 r5:84c4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85197280 INFO: task kworker/1:658:4746 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c440c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:659:4748 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2f1d84 r8:00000002 r7:60000113 r6:eb2f1d8c r5:8538a400 r4:8538a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8538a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8538a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb037000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535838c r4:85358000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535838c r4:85187080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8538a400 r8:851870ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85187080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187080 r8:8027ed34 r7:eb2f9e60 r6:85187100 r5:8538a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:4750 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:85383000 r4:85383000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85383000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85197700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85383000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb011000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534ff8c r4:8534fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534ff8c r4:85187180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85383000 r8:851871ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85187180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187180 r8:8027ed34 r7:eb2f1e60 r6:85187200 r5:85383000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85197440 INFO: task kworker/1:660:4750 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c4df1000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:661 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb30b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:662 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85398000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535878c r4:85358400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535878c r4:85187380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85398000 r8:851873ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85187380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187380 r8:8027ed34 r7:eb301e60 r6:85187400 r5:85398000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85197780 INFO: task kworker/1:662:4753 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c518d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:4759 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb305d84 r8:00000002 r7:60000013 r6:eb305d8c r5:85398c00 r4:85398c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85398c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b0700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85398c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526438c r4:85264000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526438c r4:847f2800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85398c00 r8:847f282c r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2800 r8:8027ed34 r7:eb139e60 r6:85187480 r5:85398c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b0f40 INFO: task kworker/0:155:4759 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:4761 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:85399800 r4:85399800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85399800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b0380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85399800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526478c r4:85264400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526478c r4:847f2880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85399800 r8:847f28ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2880 r8:8027ed34 r7:eb305e60 r6:85187500 r5:85399800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:851b0900 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r5:00001000 r4:edc47000 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 r5:00001000 r4:e064d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85264b8c r4:85264800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85264b8c r4:847f2900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8539a400 r8:847f292c r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2900 r8:8027ed34 r7:eb309e60 r6:85187580 r5:8539a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 r5:00001000 r4:edc47000 r4:00000001 Not tainted 6.16.0-rc1-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:8539b000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535938c r4:85359000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535938c r4:85187600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8539b000 r8:8518762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85187600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85187600 r8:8027ed34 r7:eb301e60 r6:85187680 r5:8539b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85197d40 INFO: task kworker/1:663:4765 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8539bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f75c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8539bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb539000 r5:8535b78c r4:8535b400 Exception stack(0xeb179fb0 to 0xeb179ff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r9:83018005 r8:8539c800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a6d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526578c r4:85265400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526578c r4:847f2980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8539c800 r8:847f29ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2980 r8:8027ed34 r7:eb315e60 r6:85187800 r5:8539c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r5:85e9178c r4:85e91400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8539d400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r9:83018205 r8:8539d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) r4:85030fc0 INFO: task kworker/1:665:4769 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c5f5f000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c638a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da7100 r10:82918644 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:85390000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r7:dddced40 r6:83018000 r5:8526538c r4:847f2a80 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c638a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:161:4775 blocked for more than 460 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb319d84 r8:00000002 r7:60000113 r6:eb319d8c r5:85391800 r4:85391800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85391800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85391800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85265b8c r4:85265800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85265b8c r4:847f2b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85391800 r8:847f2b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2b00 r8:8027ed34 r7:eb195e60 r6:85187a80 r5:85391800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85190240 INFO: task kworker/0:161:4775 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c6540000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:162:4777 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:85393000 r4:85393000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85393000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85393000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526678c r4:85266400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526678c r4:847f2c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85393000 r8:847f2c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2c00 r8:8027ed34 r7:eb319e60 r6:85187b00 r5:85393000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851903c0 INFO: task kworker/0:162:4777 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c6540000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:4778 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:4778 tgid:4778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85393c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85393c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85265f8c r4:85265c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85265f8c r4:847f2b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85393c00 r8:847f2bac r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2b80 r8:8027ed34 r7:eb321e60 r6:85187b80 r5:85393c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851903c0 INFO: task kworker/0:163:4778 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c681c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:4780 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb32dd84 r8:00000002 r7:60000113 r6:eb32dd8c r5:85392400 r4:85392400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85392400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85392400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac75000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526638c r4:85266000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526638c r4:847f2c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85392400 r8:847f2cac r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2c80 r8:8027ed34 r7:eb321e60 r6:85187c00 r5:85392400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85190540 INFO: task kworker/0:164:4780 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c6ae0000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:4782 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:4782 tgid:4782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb335d84 r8:00000002 r7:60000013 r6:eb335d8c r5:85390c00 r4:85390c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85390c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85390c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85266b8c r4:85266800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85266b8c r4:847f2d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85390c00 r8:847f2d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2d00 r8:8027ed34 r7:eb321e60 r6:85187c80 r5:85390c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85190640 INFO: task kworker/0:165:4782 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c6ae0000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:4785 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb341d84 r8:00000002 r7:60000013 r6:eb341d8c r5:85394800 r4:85394800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85394800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85394800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85266f8c r4:85266c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85266f8c r4:847f2d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85394800 r8:847f2dac r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2d80 r8:8027ed34 r7:eb335e60 r6:85187d00 r5:85394800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85190940 INFO: task kworker/0:166:4785 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c6da3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:4787 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:4787 tgid:4787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb349d84 r8:00000002 r7:60000013 r6:eb349d8c r5:85396c00 r4:85396c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85396c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190ec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85396c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb109000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526778c r4:85267400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526778c r4:847f2e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85396c00 r8:847f2e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2e00 r8:8027ed34 r7:eb341e60 r6:85187d80 r5:85396c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851909c0 INFO: task kworker/0:167:4787 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c6f54000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:4788 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:84c4c800 r4:84c4c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c4c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526738c r4:85267000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526738c r4:847f2e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4c800 r8:847f2eac r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2e80 r8:8027ed34 r7:eb349e60 r6:847f2f00 r5:84c4c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851909c0 INFO: task kworker/0:168:4788 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c6f54000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:4791 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:4791 tgid:4791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb34dd84 r8:00000002 r7:60000013 r6:eb34dd8c r5:84c48000 r4:84c48000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c48000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbf680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c48000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb117000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85267b8c r4:85267800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85267b8c r4:847f2f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c48000 r8:847f2fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847f2f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847f2f80 r8:8027ed34 r7:eb349e60 r6:852e6000 r5:84c48000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85190b80 INFO: task kworker/0:169:4791 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c72c1000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:4793 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb351d84 r8:00000002 r7:60000013 r6:eb351d8c r5:84c5e000 r4:84c5e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c5e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c5e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85267f8c r4:85267c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85267f8c r4:852e6080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c5e000 r8:852e60ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6080 r8:8027ed34 r7:eb34de60 r6:852e6100 r5:84c5e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85190f00 INFO: task kworker/0:170:4793 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c775c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:4796 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb355d84 r8:00000002 r7:60000013 r6:eb355d8c r5:84e10000 r4:84e10000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e10000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e10000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb145000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527c38c r4:8527c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527c38c r4:852e6180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e10000 r8:852e61ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6180 r8:8027ed34 r7:eb351e60 r6:852e6200 r5:84e10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185100 INFO: task kworker/0:171:4796 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c775c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:4797 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:84e10c00 r4:84e10c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e10c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851853c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527c78c r4:8527c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527c78c r4:852e6280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e10c00 r8:852e62ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6280 r8:8027ed34 r7:eb355e60 r6:852e6300 r5:84e10c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185100 INFO: task kworker/0:172:4797 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c7a93000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:4800 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb35dd84 r8:00000002 r7:60000013 r6:eb35dd8c r5:84e11800 r4:84e11800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e11800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851855c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e11800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527cb8c r4:8527c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527cb8c r4:852e6380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e11800 r8:852e63ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6380 r8:8027ed34 r7:eb1c9e60 r6:852e6400 r5:84e11800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185240 INFO: task kworker/0:173:4800 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c7a93000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:4801 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:84e12400 r4:84e12400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e12400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e12400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb171000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527cf8c r4:8527cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527cf8c r4:852e6480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:852e64ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6480 r8:8027ed34 r7:eb35de60 r6:852e6500 r5:84e12400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb361fb0 to 0xeb361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185240 INFO: task kworker/0:174:4801 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c7dd5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:4803 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb359d84 r8:00000002 r7:60000013 r6:eb359d8c r5:84e13c00 r4:84e13c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e13c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851858c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb187000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527d38c r4:8527d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527d38c r4:852e6580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e13c00 r8:852e65ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6580 r8:8027ed34 r7:eb361e60 r6:852e6600 r5:84e13c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185600 INFO: task kworker/0:175:4803 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c840a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:4805 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb36dd84 r8:00000002 r7:60000013 r6:eb36dd8c r5:84e14800 r4:84e14800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e14800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e14800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527d78c r4:8527d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527d78c r4:852e6680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e14800 r8:852e66ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6680 r8:8027ed34 r7:eb359e60 r6:852e6700 r5:84e14800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb36dfb0 to 0xeb36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185740 INFO: task kworker/0:176:4805 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c840a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:4807 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:4807 tgid:4807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb365d84 r8:00000002 r7:60000013 r6:eb365d8c r5:84e16000 r4:84e16000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e16000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e16000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527db8c r4:8527d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527db8c r4:852e6780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e16000 r8:852e67ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6780 r8:8027ed34 r7:eb36de60 r6:852e6800 r5:84e16000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185a00 INFO: task kworker/0:177:4807 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c852b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4809 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb371d84 r8:00000002 r7:60000013 r6:eb371d8c r5:85396000 r4:85396000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85396000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185e40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85396000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527df8c r4:8527dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527df8c r4:852e6880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85396000 r8:852e68ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6880 r8:8027ed34 r7:eb365e60 r6:85187e00 r5:85396000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851857c0 INFO: task kworker/0:178:4809 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c8794000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:179:4811 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:179 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb375d84 r8:00000002 r7:60000113 r6:eb375d8c r5:85395400 r4:85395400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85395400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85185f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85395400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527e38c r4:8527e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527e38c r4:852e6900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85395400 r8:852e692c r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6900 r8:8027ed34 r7:eb371e60 r6:85187e80 r5:85395400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb375fb0 to 0xeb375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185cc0 INFO: task kworker/0:179:4811 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c8794000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:4813 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:4813 tgid:4813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb379d84 r8:00000002 r7:60000013 r6:eb379d8c r5:8539ec00 r4:8539ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8539ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b0580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8539ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527e78c r4:8527e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527e78c r4:852e6980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8539ec00 r8:852e69ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6980 r8:8027ed34 r7:eb375e60 r6:85187f00 r5:8539ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb379fb0 to 0xeb379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85185e00 INFO: task kworker/0:180:4813 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c8794000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4815 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb381d84 r8:00000002 r7:60000013 r6:eb381d8c r5:853a0c00 r4:853a0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847de300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb207000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527ef8c r4:8527ec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527ef8c r4:852e6a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a0c00 r8:852e6a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6a00 r8:8027ed34 r7:eb379e60 r6:85187f80 r5:853a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb381fb0 to 0xeb381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de080 INFO: task kworker/0:181:4815 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c9069000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:4817 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb389d84 r8:00000002 r7:60000113 r6:eb389d8c r5:853a2400 r4:853a2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847de040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527eb8c r4:8527e800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527eb8c r4:852e6a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a2400 r8:852e6aac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6a80 r8:8027ed34 r7:eb381e60 r6:85179000 r5:853a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de080 INFO: task kworker/0:182:4817 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c94af000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:183:4819 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:183 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb391d84 r8:00000002 r7:60000113 r6:eb391d8c r5:853a3000 r4:853a3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847de9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537c38c r4:8537c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537c38c r4:852e6b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a3000 r8:852e6b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6b00 r8:8027ed34 r7:eb381e60 r6:85179080 r5:853a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de180 INFO: task kworker/0:183:4819 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c9933000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:4820 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb395d84 r8:00000002 r7:60000013 r6:eb395d8c r5:853a1800 r4:853a1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847de4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb215000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527f38c r4:8527f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527f38c r4:852e6b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a1800 r8:852e6bac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6b80 r8:8027ed34 r7:eb391e60 r6:85179100 r5:853a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de180 INFO: task kworker/0:184:4820 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: c9b24000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:4823 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:853a0000 r4:853a0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847de5c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527f78c r4:8527f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527f78c r4:852e6c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a0000 r8:852e6c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6c00 r8:8027ed34 r7:eb391e60 r6:85179180 r5:853a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de280 INFO: task kworker/0:185:4823 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe07e5d20 to 0xe07e5d68) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:4825 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:853a3c00 r4:853a3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847de740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb237000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527fb8c r4:8527f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527fb8c r4:852e6c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a3c00 r8:852e6cac r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6c80 r8:8027ed34 r7:eb391e60 r6:85179280 r5:853a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de380 INFO: task kworker/0:186:4825 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847de840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e15400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb245000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527ff8c r4:8527fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527ff8c r4:852e6d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e15400 r8:852e6d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6d00 r8:8027ed34 r7:eb391e60 r6:852e6d80 r5:84e15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de540 INFO: task kworker/0:187:4826 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537c78c r4:8537c400 r4:852e6e00 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:4830 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:84e13000 r4:84e13000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e13000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dee80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e13000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ad000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537cf8c r4:8537cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537cf8c r4:852e6f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e13000 r8:852e6f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852e6f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e6f00 r8:8027ed34 r7:eb3a5e60 r6:852e6f80 r5:84e13000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847de7c0 INFO: task kworker/0:189:4830 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ca619000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:82ac11e4 r4:00000000 r5:00001000 r4:edc47000 r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:4833 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:4833 tgid:4833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb3b5d84 r8:00000002 r7:60000013 r6:eb3b5d8c r5:84c78c00 r5:84c78c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 80070013 ffffffff [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537d38c r4:8537d000 r10:00000000 r9:85199100 r8:8027ed34 r7:eb37de60 r6:85199180 r5:84c7a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: ca619000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:4837 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb3e5d84 r8:00000002 r7:60000013 r6:eb3e5d8c r5:84c7b000 r4:84c7b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c7b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f3e40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85359f8c r4:85359c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85359f8c r4:85199200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:193 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85199300 r8:8027ed34 r7:eb3e5e60 r6:85199380 r5:84c79800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:4840 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb3b9d84 r8:00000002 r7:60000113 r6:eb3b9d8c r5:853a4800 r4:853a4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f3c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb403000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535a38c r4:8535a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535a38c r4:85179300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a4800 r8:8517932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85179300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85179300 r8:8027ed34 r7:eb179e60 r6:85179380 r5:853a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f3d80 INFO: task kworker/1:666:4840 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cae50000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c7440 r7:dddced40 r6:83018000 r5:8537d78c r4:85199400 Exception stack(0xeb401fb0 to 0xeb401ff8) r4:847c7080 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:4846 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb40dd84 r8:00000002 r7:60000013 r6:eb40dd8c r5:84c7c800 r4:84c7c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c7c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c7640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffbb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537df8c r4:8537dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537df8c r4:85199500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7c800 r8:8519952c r7:82804d40 r6:dddced40 r5:dddced60 r4:85199500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199500 r8:8027ed34 r7:eb3f1e60 r6:85199580 r5:84c7c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c7340 INFO: task kworker/0:195:4846 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cb5c7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c7780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537e38c r4:8537e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537e38c r4:85199600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7e000 r8:8519962c r7:82804d40 r6:dddced40 r5:dddced60 r4:85199600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199600 r8:8027ed34 r7:eb40de60 r6:85199680 r5:84c7e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c7340 INFO: task kworker/0:196:4848 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cb5c7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 INFO: task kworker/0:197:4850 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb2b9d84 r8:00000002 r7:60000013 r6:eb2b9d8c r5:84c7ec00 r4:84c7ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c7ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c7940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0777000 r10:61c88647 r9:84c7d400 r8:8519982c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c7e00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c78000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e091f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537f38c r4:8537f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537f38c r4:85199900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c78000 r8:8519992c r7:82804d40 r6:dddced40 r5:dddced60 r4:85199900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199900 r8:8027ed34 r7:eb311e60 r6:85199980 r5:84c78000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c78c0 INFO: task kworker/0:199:4854 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cc1d2000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:4855 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:4855 tgid:4855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb3fdd84 r8:00000002 r7:60000113 r6:eb3fdd8c r5:85330000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537ef8c r4:8537ec00 r10:00000000 r9:85199a00 r8:8027ed34 r7:eb411e60 r6:85199a80 r5:85330000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c7f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85330c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49c0000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537f78c r4:8537f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537f78c r4:85199b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85330c00 r8:85199b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85199b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199b00 r8:8027ed34 r7:eb411e60 r6:85199b80 r5:85330c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c7d00 INFO: task kworker/0:201:4858 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cc751000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb41dfb0 to 0xeb41dff8) r4:847c7fc0 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:203 state:D stack:0 pid:4862 tgid:4862 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:85332400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537ff8c r4:8537fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537ff8c r4:85199d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85332400 r8:85199d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85199d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85199d00 r8:8027ed34 r7:eb41de60 r6:85199d80 r5:85332400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c7f40 INFO: task kworker/0:203:4862 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ccd90000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:4864 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb419d84 r8:00000002 r7:60000013 r6:eb419d8c r5:85333c00 r4:85333c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85333c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dec80 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb429fb0 to 0xeb429ff8) INFO: task kworker/0:205:4866 is blocked on a mutex likely owned by task kworker/1:311:3883. Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cd418000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:4868 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:4868 tgid:4868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb425d84 r8:00000002 r7:60000013 r6:eb425d8c r5:85333000 r4:85333000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85333000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d77780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85333000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85290b8c r4:85290800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85290b8c r4:853d9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85333000 r8:853d902c r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9000 r8:8027ed34 r7:eb419e60 r6:853d9080 r5:85333000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:207 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:4872 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:4872 tgid:4872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb42dd84 r8:00000002 r7:60000013 r6:eb42dd8c r5:85336c00 r4:85336c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85336c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d778c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85336c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85290f8c r4:85290c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85290f8c r4:853d9200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85336c00 r8:853d922c r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9200 r8:8027ed34 r7:eb425e60 r6:853d9280 r5:85336c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb42dfb0 to 0xeb42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d77600 INFO: task kworker/0:208:4872 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cdc5d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:209 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 INFO: task kworker/0:210:4877 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb44dd84 r8:00000002 r7:60000013 r6:eb44dd8c r5:84eb8000 r4:84eb8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eb8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d77bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84eb8000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf8f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529178c r4:85291400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529178c r4:853d9400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eb8000 r8:853d942c r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9400 r8:8027ed34 r7:eb435e60 r6:853d9480 r5:84eb8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d77840 INFO: task kworker/0:210:4877 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ce5ef000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4040 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:4880 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb451d84 r8:00000002 r7:60000013 r6:eb451d8c r5:84eba400 r4:84eba400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84eba400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb451e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d77d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84eba400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85291b8c r4:85291800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85291b8c r4:853d9600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eba400 r8:853d962c r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9600 r8:8027ed34 r7:eb455e60 r6:853d9680 r5:84eba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb451fb0 to 0xeb451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d779c0 INFO: task kworker/0:212:4880 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ceb90000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:213 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:80070013 r4:80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:4884 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb45dd84 r8:00000002 r7:60000013 r6:eb45dd8c r5:853a6c00 r4:853a6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e43c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529278c r4:85292400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529278c r4:853d9780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a6c00 r8:853d97ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9780 r8:8027ed34 r7:eb455e60 r6:85179480 r5:853a6c00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:853e4180 Workqueue: events bpf_prog_free_deferred Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:215 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:853d9800 r8:8027ed34 r7:eb45de60 r6:85179500 r5:853a8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:80070013 r4:80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:216 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e45c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb019000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85292f8c r4:85292c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85292f8c r4:853d9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853aa400 r8:853d98ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9880 r8:8027ed34 r7:eb465e60 r6:85179580 r5:853aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e42c0 INFO: task kworker/0:216:4889 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cf4d5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:4890 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb475d84 r8:00000002 r7:60000013 r6:eb475d8c r5:853a8c00 r4:853a8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb039000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:853d9900 Exception stack(0xeb475fb0 to 0xeb475ff8) INFO: task kworker/0:217:4890 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:4892 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:853abc00 r4:853abc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853abc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb059000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529378c r4:85293400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8529378c r4:853d9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853abc00 r8:853d99ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9980 r8:8027ed34 r7:eb475e60 r6:85179680 r5:853abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e4340 INFO: task kworker/0:218:4892 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: cfd34000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:4894 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb4a1d84 r8:00000002 r7:60000013 r6:eb4a1d8c r5:853a9800 r4:853a9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:853a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 r10:61c88647 r9:853a9800 r8:853d9a2c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:84da7100 task:kworker/0:220 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d047d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:4897 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:853ad400 r4:853ad400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ad400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85293f8c r4:85293c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:222 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb495000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853bc78c r4:853bc400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853bc78c r4:853d9b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ab000 r8:853d9bac r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9b80 r8:8027ed34 r7:eb4a5e60 r6:85179880 r5:853ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e4b00 INFO: task kworker/0:222:4900 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d0a8f000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:853a5400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:223:4902 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d60: 80070013 ffffffff r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853bcb8c r4:853bc800 r10:00000000 r9:853d9c80 r8:8027ed34 r7:eb4c5e60 r6:85179980 r5:853aec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:4905 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb4e1d84 r8:00000002 r7:60000013 r6:eb4e1d8c r5:853b0c00 r4:853b0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eb340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853bdb8c r4:853bd800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853bdb8c r4:853d9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b0c00 r8:853d9d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9d00 r8:8027ed34 r7:eb4c5e60 r6:85179a00 r5:853b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e4d80 INFO: task kworker/0:225:4905 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d17ad000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 r4:00000000 r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e4fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853bd38c r4:853bd000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853bd38c r4:853d9d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b1800 r8:853d9dac r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9d80 r8:8027ed34 r7:eb4e1e60 r6:85179a80 r5:853b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e4fc0 INFO: task kworker/0:226:4908 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d1d15000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:4911 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:853eb100 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:e07e5dc0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:4913 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb509d84 r8:00000002 r7:60000013 r6:eb509d8c r5:853b3000 r4:853b3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eb6c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb511000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853be38c r4:853be000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853be38c r4:853d9e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b3000 r8:853d9eac r7:82804d40 r6:dddced40 r5:dddced60 r4:853d9e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d9e80 r8:8027ed34 r7:eb4e1e60 r6:853d9f00 r5:853b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:228:4913 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:229 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb505000 r10:61c88647 r9:84ebd400 r8:853d9fac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:230 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853bef8c r4:853bec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853bef8c r4:853ee080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ebe000 r8:853ee0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ee080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee080 r8:8027ed34 r7:eb509e60 r6:853ee100 r5:84ebe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853eb540 INFO: task kworker/0:230:4917 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d2353000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:4918 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:853b3c00 r4:853b3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb519000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535af8c r4:8535ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535af8c r4:85179b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b3c00 r8:85179bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85179b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85179b80 r8:8027ed34 r7:eb179e60 r6:85179c00 r5:853b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f7080 INFO: task kworker/1:667:4918 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:231 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee180 r8:8027ed34 r7:eb51de60 r6:85179c80 r5:853b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853eb080 INFO: task kworker/0:231:4919 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d26a9000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:4920 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8535b38c r4:8535b000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:669 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfc69000 r7:ddde2d40 r6:83018200 r5:842e9f8c r4:85179e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b6000 r8:85179e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85179e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85179e00 r8:8027ed34 r7:eb179e60 r6:85179e80 r5:853b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f73c0 INFO: task kworker/1:669:4924 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d2d01000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:4925 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:853b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:232 state:D stack:0 pid:4926 tgid:4926 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ebc00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb551000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853beb8c r4:853be800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853beb8c r4:853ee200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b0000 r8:853ee22c r7:82804d40 r6:dddced40 r5:dddced60 r4:853ee200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee200 r8:8027ed34 r7:eb51de60 r6:853ed000 r5:853b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853eb940 INFO: task kworker/0:232:4926 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d3100000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb549fb0 to 0xeb549ff8) r4:853ebc80 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537438c r4:85374000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537438c r4:853ed100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85418000 r8:853ed12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ed100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed100 r8:8027ed34 r7:eb531e60 r6:853ed180 r5:85418000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f78c0 INFO: task kworker/1:671:4934 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d34d3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:4936 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb331d84 r8:00000002 r7:60000113 r6:eb331d8c r5:85418c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:4938 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:4938 tgid:4938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb339d84 r8:00000002 r7:60000013 r6:eb339d8c r5:85419800 r4:85419800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85419800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ec280 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:853ed300 Exception stack(0xeb339fb0 to 0xeb339ff8) r4:853f7c00 Call trace: Exception stack(0xe07e5d20 to 0xe07e5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541a400 r8:853ee32c r7:82804d40 r6:dddced40 r5:dddced60 r4:853ee300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee300 r8:8027ed34 r7:eb549e60 r6:853ed400 r5:8541a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ebf00 INFO: task kworker/0:234:4939 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d3eb6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:4940 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:8541b000 r4:8541b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ec040 r7:ddde2d40 r6:83018200 r5:85374b8c r4:853ed480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:674:4940 is blocked on a mutex likely owned by task kworker/1:311:3883. r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) INFO: task kworker/0:235:4942 blocked for more than 462 seconds. r10:82918644 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:8541bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537478c r4:85374400 r10:00000000 r9:853ee380 r8:8027ed34 r7:eb549e60 r6:853ed580 r5:8541bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:4946 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:8541c800 r4:8541c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d8c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8541c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853bf78c r4:853bf400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853bf78c r4:853ee400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541c800 r8:853ee42c r7:82804d40 r6:dddced40 r5:dddced60 r4:853ee400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee400 r8:8027ed34 r7:eb549e60 r6:853ed600 r5:8541c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:e07e5dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:675 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:676 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918644 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:8541e000 r4:8541e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ec500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541e000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537578c r4:85375400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537578c r4:853ed800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541e000 r8:853ed82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ed800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed800 r8:8027ed34 r7:eb3ede60 r6:853ed880 r5:8541e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ec200 INFO: task kworker/1:676:4949 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d4a67000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:8541ec00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:678 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537678c r4:85376400 r10:61c88647 r9:85420000 r8:853ed9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ec480 INFO: task kworker/1:678:4953 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d5124000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:4955 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:85420c00 r4:85420c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb09f000 r10:61c88647 r9:85420c00 r8:853edaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853eda80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eda80 r8:8027ed34 r7:eb575e60 r6:853edb00 r5:85420c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ec740 INFO: task kworker/1:679:4955 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d5124000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:680 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:680:4957 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:4959 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb581d84 r8:00000002 r7:60000013 r6:eb581d8c r5:85422400 r4:85422400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85422400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d5437000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:682 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:85423c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r10:61c88647 r9:85423c00 r8:853eddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:683 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ecfc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb147000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85376f8c r4:85376c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85376f8c r4:853ede80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85424800 r8:853edeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ede80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ede80 r8:8027ed34 r7:eb581e60 r6:853edf00 r5:85424800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ecf00 INFO: task kworker/1:683:4962 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d58df000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d84680 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85425400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb159000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537738c r4:85377000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537738c r4:853edf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85425400 r8:853edfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853edf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853edf80 r8:8027ed34 r7:eb581e60 r6:84d7d000 r5:85425400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db7900 INFO: task kworker/1:684:4965 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d58df000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:4967 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:4967 tgid:4967 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85426000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d5ed2000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:686:4969 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:686 state:D stack:0 pid:4969 tgid:4969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:85426c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:686:4969 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:4970 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85423000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r10:61c88647 r9:85423000 r8:84d7d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:688 state:D stack:0 pid:4973 tgid:4973 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:851aa480 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:4975 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:4975 tgid:4975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb5a5d84 r8:00000002 r7:60000013 r6:eb5a5d8c r5:85428c00 r4:85428c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85428c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851aa8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85428c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454b8c r4:85454800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85454b8c r4:84d7d480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85428c00 r8:84d7d4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7d480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7d480 r8:8027ed34 r7:eb5a1e60 r6:84d7d500 r5:85428c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851aa5c0 INFO: task kworker/1:689:4975 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:85e9178c r4:85e91400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:690 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb5a9d84 r8:00000002 r7:60000013 r6:eb5a9d8c r5:85429800 r4:85429800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85429800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851aab40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85429800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454f8c r4:85454c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85454f8c r4:84d7d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85429800 r8:84d7d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7d580 r8:8027ed34 r7:eb5a5e60 r6:84d7d600 r5:85429800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851aa6c0 INFO: task kworker/1:690:4977 is blocked on a mutex likely owned by task kworker/1:311:3883. r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 task:kworker/1:691 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb59dd84 r8:00000002 r7:60000013 r6:eb59dd8c r5:8542b000 r4:8542b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851aacc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542b000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb217000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545538c r4:85455000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8545538c r4:84d7d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542b000 r8:84d7d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7d680 r8:8027ed34 r7:eb5a9e60 r6:84d7d700 r5:8542b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:692:4981 blocked for more than 462 seconds. r4:8542c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84d7d780 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:692:4981 is blocked on a mutex likely owned by task kworker/1:311:3883. r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d70f3000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:4983 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:8542d400 r4:8542d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8542d400 r8:84d7d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: d728e000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4985 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 r4:00000000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853d8ac0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518c4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb273000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455f8c r4:85455c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85455f8c r4:84d7da00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542ec00 r8:84d7da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7da00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7da00 r8:8027ed34 r7:eb5b9e60 r6:84d7da80 r5:8542ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:84d84680 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518c6c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb287000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545638c r4:85456000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8545638c r4:84d7db00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542bc00 r8:84d7db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7db00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7db00 r8:8027ed34 r7:eb5c1e60 r6:84d7db80 r5:8542bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 80070013 ffffffff r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:4990 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:85430c00 r4:85430c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85430c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518c8c0 r7:ddde2d40 r6:83018200 r5:8545678c r4:84d7dc00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8518c740 INFO: task kworker/1:697:4994 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d7e76000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:4995 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918644 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:85432400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85432400 r8:84d7de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:edc47000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518c480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85433000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457b8c r4:85457800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85457b8c r4:84d7df00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85433000 r8:84d7df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d7df00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d7df00 r8:8027ed34 r7:eb5cde60 r6:84d7df80 r5:85433000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518c980 INFO: task kworker/1:699:4997 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d88bd000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb3d4000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:700:4998 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:5001 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb5d5d84 r8:00000002 r7:60000113 r6:eb5d5d8c r5:85434800 r4:85434800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85434800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ce80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85434800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545778c r4:85457400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8545778c r4:847c4100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85434800 r8:847c412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c4100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c4100 r8:8027ed34 r7:eb5d1e60 r6:847c4180 r5:85434800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518cdc0 INFO: task kworker/1:701:5001 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d8d55000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:702:5004 blocked for more than 462 seconds. r10:82918644 r9:eb5e1d84 r8:00000002 r7:60000113 r6:eb5e1d8c r5:85435400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847c4200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:702:5004 is blocked on a mutex likely owned by task kworker/1:311:3883. 5d20: d8d55000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:5006 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/1:703 state:D stack:0 pid:5006 tgid:5006 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85436000 r8:847c432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c4300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c4300 r8:8027ed34 r7:eb5e1e60 r6:847c4380 r5:85436000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85195000 INFO: task kworker/1:703:5006 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d8d55000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r5:00001000 r4:edc47000 Exception stack(0xe07e5fb0 to 0xe07e5ff8) Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851950c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546038c r4:85460000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe07e5fb0 to 0xe07e5ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85440000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546138c r4:85461000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546138c r4:847c4600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85440000 r8:847c462c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c4600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c4600 r8:8027ed34 r7:eb5f9e60 r6:847c4680 r5:85440000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb479fb0 to 0xeb479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85195500 INFO: task kworker/1:706:5012 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d994f000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e07e5dc0 r5:85e9178c r4:85e91400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85442400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85461b8c r4:85461800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85461b8c r4:847c4800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85442400 r8:847c482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c4800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c4800 r8:8027ed34 r7:eb479e60 r6:847c4880 r5:85442400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85195640 INFO: task kworker/1:708:5015 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: d994f000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85441800 r8:847c492c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:84ebc800 r4:84ebc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ebc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aff80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ebc800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb055000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c878c r4:853c8400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c878c r4:853ee500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ebc800 r8:853ee52c r7:82804d40 r6:dddced40 r5:dddced60 r4:853ee500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: da39c000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:239 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 r4:853d8f00 Exception stack(0xe07e5d20 to 0xe07e5d68) 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) r4:84da7100 r4:84ebbc00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:84d84680 INFO: task kworker/1:711:5026 blocked for more than 463 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85195500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e28000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead49000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85461f8c r4:85461c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85461f8c r4:847c4a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e28000 r8:847c4aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c4a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c4a80 r8:8027ed34 r7:eb619e60 r6:853ee780 r5:84e28000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85195d80 INFO: task kworker/1:711:5026 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d20: da9a1000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 r5:85e9178c r4:85e91400 r4:00000001 INFO: task kworker/1:712:5027 blocked for more than 463 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:847c4b00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80070013 ffffffff r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 Exception stack(0xe07e5fb0 to 0xe07e5ff8) task:kworker/1:713 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:84e2a400 r8:847c4bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c4b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c4b80 r8:8027ed34 r7:eb625e60 r6:853ee880 r5:84e2a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c30c0 INFO: task kworker/1:713:5029 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: dacd5000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e29800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:5033 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:84e2b000 r4:84e2b000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847c3140 Exception stack(0xe07e5d20 to 0xe07e5d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 task:kworker/1:716 state:D stack:0 pid:5035 tgid:5035 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:84e2bc00 r4:84e2bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e2bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546338c r4:85463000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546338c r4:847c4d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2bc00 r8:847c4d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 80070013 ffffffff r4:00000000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:847c4d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:5041 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:84e2e000 r4:84e2e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e2e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8546878c r4:847c4e80 Exception stack(0xeb651fb0 to 0xeb651ff8) r4:847c3540 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:84d84680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:84e2d400 r4:84e2d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e2d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb183000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c9b8c r4:853c9800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c9b8c r4:853eec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2d400 r8:853eec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853eec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eec00 r8:8027ed34 r7:eb46de60 r6:853eec80 r5:84e2d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afec0 INFO: task kworker/0:240:5044 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:5046 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:5046 tgid:5046 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r10:61c88647 r9:84ebec00 r8:847c4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:241 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:84eb8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 Exception stack(0xeb659fb0 to 0xeb659ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847affc0 INFO: task kworker/0:241:5047 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: dc39b000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918644 r9:eb65dd84 r8:00000002 r7:60000013 r6:eb65dd8c r5:85488000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb4b9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85468b8c r4:85468800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85468b8c r4:847c4f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85488000 r8:847c4fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847c4f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c4f80 r8:8027ed34 r7:eb651e60 r6:853eee80 r5:85488000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c3680 INFO: task kworker/1:721:5050 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:722:5052 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:722 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb661d84 r8:00000002 r7:60000013 r6:eb661d8c r5:85488c00 r4:85488c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85488c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85488c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85468f8c r4:85468c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85468f8c r4:847b7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85488c00 r8:847b702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7000 r8:8027ed34 r7:eb65de60 r6:853eef00 r5:85488c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb661fb0 to 0xeb661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c3c40 INFO: task kworker/1:722:5052 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: dca96000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:e07e5dc0 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:5056 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:8548a400 r4:8548a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8548a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546a38c r4:8546a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546a38c r4:847b7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548a400 r8:847b712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7100 r8:8027ed34 r7:eb665e60 r6:84da9000 r5:8548a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb669fb0 to 0xeb669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c3f40 INFO: task kworker/1:724:5056 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe07e5d20 to 0xe07e5d68) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb66dd84 r8:00000002 r7:60000013 r6:eb66dd8c r5:8548b000 r4:8548b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851aaac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8548b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546978c r4:85469400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546978c r4:847b7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548b000 r8:847b71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7180 r8:8027ed34 r7:eb669e60 r6:84da9080 r5:8548b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c3fc0 INFO: task kworker/1:725:5058 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: dd14a000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:726 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb4f3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r4:85192100 Workqueue: events bpf_prog_free_deferred 5d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r5:00001000 r4:edc47000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 Exception stack(0xe07e5fb0 to 0xe07e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:5062 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb611d84 r8:00000002 r7:60000013 r6:eb611d8c r5:8548c800 r4:8548c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f0ec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8548c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb143000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c938c r4:853c9000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c938c r4:84da9180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548c800 r8:84da91ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da9180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da9180 r8:8027ed34 r7:eb649e60 r6:84da9200 r5:8548c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f0080 INFO: task kworker/0:242:5062 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: dd6a7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85469f8c r4:85469c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85469f8c r4:847b7280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548d400 r8:847b72ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7280 r8:8027ed34 r7:eb669e60 r6:84da9280 r5:8548d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85192000 INFO: task kworker/1:727:5063 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: dd6a7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:728 state:D stack:0 pid:5066 tgid:5066 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847b7300 r8:8027ed34 r7:eb669e60 r6:84da9300 r5:85490000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:e07e5dc0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 task:kworker/1:729 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb68dd84 r8:00000002 r7:60000113 r6:eb68dd8c r5:85491800 r4:85491800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85491800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85491800 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546af8c r4:8546ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546af8c r4:847b7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85491800 r8:847b73ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7380 r8:8027ed34 r7:eb685e60 r6:84da9380 r5:85491800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851924c0 INFO: task kworker/1:729:5068 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ddfb7000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:730 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85492400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85492400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 r5:00001000 r4:eb543000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546ab8c r4:8546a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546ab8c r4:847b7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85492400 r8:847b742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7400 r8:8027ed34 r7:eb68de60 r6:84da9400 r5:85492400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851924c0 INFO: task kworker/1:730:5069 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: de25d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:5079 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:85493c00 r4:85493c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85493c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851929c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85493c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd91000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546b38c r4:8546b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546b38c r4:847b7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493c00 r8:847b74ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7480 r8:8027ed34 r7:eb68de60 r6:84da9480 r5:85493c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85192f40 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:5080 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:85494800 r4:85494800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85494800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85494800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0573000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546b78c r4:8546b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546b78c r4:847b7500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85494800 r8:847b752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7500 r8:8027ed34 r7:eb6b1e60 r6:84da9500 r5:85494800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85192f40 INFO: task kworker/1:732:5080 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: de4a6000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:733:5082 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:733 state:D stack:0 pid:5082 tgid:5082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6bdd84 r8:00000002 r7:60000013 r6:eb6bdd8c r5:85495400 r4:85495400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85495400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85495400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0633000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546bb8c r4:8546b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546bb8c r4:847b7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85495400 r8:847b75ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7580 r8:8027ed34 r7:eb6b9e60 r6:84da9580 r5:85495400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85192f40 INFO: task kworker/1:733:5082 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: de849000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:5083 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6c1d84 r8:00000002 r7:60000113 r6:eb6c1d8c r5:85493000 r4:85493000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85493000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0807000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546bf8c r4:8546bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546bf8c r4:847b7600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493000 r8:847b762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7600 r8:8027ed34 r7:eb6bde60 r6:84da9600 r5:85493000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85192f40 INFO: task kworker/1:734:5083 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: ded77000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:735:5084 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:735 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6c5d84 r8:00000002 r7:60000113 r6:eb6c5d8c r5:85496000 r4:85496000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85496000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85496000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546c38c r4:8546c000 r7:ddde2d40 r6:83018200 r5:8546c38c r4:847b7680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84d40080 INFO: task kworker/1:735:5084 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: df09d000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918644 r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:8548ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:edc47000 r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8546cb8c r4:8546c800 r10:00000000 r9:847b7780 r8:8027ed34 r7:eb6cde60 r6:84da9780 r5:8548e000 Workqueue: events bpf_prog_free_deferred 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:738:5088 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:738 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6d5d84 r8:00000002 r7:60000113 r6:eb6d5d8c r5:85490c00 r4:85490c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85490c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85490c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb081000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546cf8c r4:8546cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546cf8c r4:847b7800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85490c00 r8:847b782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7800 r8:8027ed34 r7:eb6d1e60 r6:84da9800 r5:85490c00 r4:84d40080 r4:00000000 r4:82ac11e4 r4:00000000 r5:85e9178c r4:85e91400 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84d00000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d40140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d00000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546d38c r4:8546d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546d38c r4:847b7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d00000 r8:847b78ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7880 r8:8027ed34 r7:eb6d5e60 r6:84da9880 r5:84d00000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e48940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85444800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546db8c r4:8546d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546db8c r4:847b7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85444800 r8:847b792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7900 r8:8027ed34 r7:eb6d9e60 r6:847b7980 r5:85444800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d40080 INFO: task kworker/1:740:5090 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: e0019000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f1c3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e9178c r4:85e91400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e9178c r4:84d84680 r4:84d84680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:741 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e48bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85445400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546e38c r4:8546e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546e38c r4:847b7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85445400 r8:847b7a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b7a00 r8:8027ed34 r7:eb675e60 r6:847b7a80 r5:85445400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb67dfb0 to 0xeb67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d40080 INFO: task kworker/1:741:5091 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe07e5d20 to 0xe07e5d68) r4:e07e5dc0 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f361000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:5095 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:5095 tgid:5095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6e9d84 r8:00000002 r7:60000113 r6:eb6e9d8c r5:85446c00 r4:85446c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85446c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbfd80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85446c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c978c r4:853c9400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c978c r4:84da9900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85446c00 r8:84da992c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da9900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847f0e80 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 r4:e07e5dc0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:244:5096 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred r10:82918644 r9:eb6edd84 r8:00000002 r7:60000113 r6:eb6edd8c r5:85443c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85443c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ca38c r4:853ca000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853ca38c r4:84da9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85443c00 r8:84da99ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da9980 r8:8027ed34 r7:eb649e60 r6:847b7b80 r5:85443c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a20c0 INFO: task kworker/0:244:5096 is blocked on a mutex likely owned by task kworker/1:311:3883. task:kworker/1:311 state:R running task stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85058000 r8:80200be4 r7:e07e5d54 r6:ffffffff r5:85058000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe07e5d20 to 0xe07e5d68) 5d20: e040e000 e06ad000 00000001 80239bb8 7f015000 00000001 82ac11c4 82ac05a0 5d40: 7f015000 e06ad000 8280c9b4 e07e5d9c e07e5da0 e07e5d70 80230af4 80239bd0 5d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e07e5dc0 r5:e07e5e08 r4:e07e5dc0 [<80222da8>] (vfp_notifier) from [<8028957c>] (notifier_call_chain+0x60/0x1b4 kernel/notifier.c:85) r7:00000000 r6:ffffffff r5:8281ca60 r4:00000000 [<80304ff0>] (__rcu_read_unlock) from [<80289800>] (rcu_read_unlock include/linux/rcupdate.h:873 [inline]) [<80304ff0>] (__rcu_read_unlock) from [<80289800>] (atomic_notifier_call_chain+0x44/0x50 kernel/notifier.c:224) [<802897bc>] (atomic_notifier_call_chain) from [<80201170>] (__switch_to+0x34/0x54 arch/arm/kernel/entry-armv.S:546) Exception stack(0xe07e5ea8 to 0xe07e5ef0) 5ea0: 85e9178c 84d84680 85e9178c 83018200 ddde2d40 00000001 5ec0: 81a611e0 00000402 842cd000 8280c960 00000000 00000004 81c01ab8 00000000 5ee0: 00000002 81fdc03b 80295b04 85058000 r6:85058000 r5:85058000 r4:84505410 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:61c88647 r9:85058000 r8:84d846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85058000 [<81a611b4>] (schedule) from [<8027edb0>] (worker_thread+0x7c/0x3d8 kernel/workqueue.c:3417) r5:ddde2d60 r4:84d84680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d84680 r8:8027ed34 r7:e07e1e60 r6:84d84700 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84da7100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:5098 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6f5d84 r8:00000002 r7:60000113 r6:eb6f5d8c r5:85496c00 r4:85496c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85496c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85496c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c9f8c r4:853c9c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c9f8c r4:84da9a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496c00 r8:84da9a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da9a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da9a00 r8:8027ed34 r7:eb6ede60 r6:847b7c00 r5:85496c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2280 INFO: task kworker/0:245:5098 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 7f40d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85443000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 7f994000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:5103 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb701d84 r8:00000002 r7:60000013 r6:eb701d8c r5:85446000 r4:85446000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85446000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85446000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fd000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84da9b00 r8:8027ed34 r7:eb6fde60 r6:847b7d00 r5:85446000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:5104 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:5104 tgid:5104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:8542e000 r4:8542e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84da9b80 r8:8027ed34 r7:eb701e60 r6:847b7d80 r5:8542e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2640 INFO: task kworker/0:248:5104 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 7fe35000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:5107 blocked for more than 463 seconds. task:kworker/0:249 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84da9c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da9c00 r8:8027ed34 r7:eb705e60 r6:847b7e00 r5:85438000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2680 INFO: task kworker/0:249:5107 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 80390000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb259000 r10:61c88647 r9:8543a400 r8:84da9cac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb715d84 r8:00000002 r7:60000013 r6:eb715d8c r5:85438c00 r4:85438c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85438c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ab100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85438c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb559000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c0b8c r4:854c0800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c0b8c r4:84da9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85438c00 r8:84da9d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da9d00 r8:8027ed34 r7:eb711e60 r6:847b7f00 r5:85438c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb715fb0 to 0xeb715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2940 INFO: task kworker/0:251:5111 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 80a7e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2940 INFO: task kworker/0:252:5112 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 80a7e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:5115 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85439800 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb31d000 r10:61c88647 r9:85439800 r8:84da9e2c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8454238c r4:84da9e80 r10:61c88647 r9:8543bc00 r8:84da9eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da9e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da9e80 r8:8027ed34 r7:eb715e60 r6:84d9d080 r5:8543bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2c00 INFO: task kworker/0:254:5116 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 81112000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:5118 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 81112000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:5120 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb739d84 r8:00000002 r7:60000013 r6:eb739d8c r5:8543d400 r4:8543d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f0a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8543d400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c078c r4:854c0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c078c r4:84da9f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543d400 r8:84da9fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da9f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da9f80 r8:8027ed34 r7:eb715e60 r6:84d9d180 r5:8543d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2ec0 INFO: task kworker/0:256:5120 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8543c800 r8:84d2f02c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:5124 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:5124 tgid:5124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb745d84 r8:00000002 r7:60000113 r6:eb745d8c r5:8543ec00 r4:8543ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ab280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8543ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb563000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c0f8c r4:854c0c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c0f8c r4:84d2f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543ec00 r8:84d2f12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f100 r8:8027ed34 r7:eb741e60 r6:84d9d280 r5:8543ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ab300 INFO: task kworker/0:258:5124 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:259 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c178c r4:854c1400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c178c r4:84d2f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85448000 r8:84d2f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f080 r8:8027ed34 r7:eb741e60 r6:84d9d300 r5:85448000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ab0c0 INFO: task kworker/0:259:5127 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 820d3000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:5129 blocked for more than 463 seconds. task:kworker/0:260 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:85449800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85449800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb759000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c1f8c r4:854c1c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c1f8c r4:84d2f200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85449800 r8:84d2f22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f200 r8:8027ed34 r7:eb75de60 r6:84d9d400 r5:85449800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ab3c0 INFO: task kworker/0:261:5131 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8225d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:5134 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ab980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8544a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb769000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c238c r4:854c2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c238c r4:84d2f280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544a400 r8:84d2f2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f280 r8:8027ed34 r7:eb761e60 r6:84d9d480 r5:8544a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ab780 INFO: task kworker/0:262:5134 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 82487000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:5135 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:8544b000 r4:8544b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8544b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abbc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8544b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb781000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c2b8c r4:854c2800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c2b8c r4:84d2f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544b000 r8:84d2f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f300 r10:00000000 r9:84d2f300 r8:8027ed34 r7:eb775e60 r6:84d9d500 r5:8544b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:5137 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb785d84 r8:00000002 r7:60000113 r6:eb785d8c r5:8544bc00 r4:8544bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8544bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abb00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8544bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:854c278c r4:84d2f380 Exception stack(0xeb785fb0 to 0xeb785ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:265:5139 blocked for more than 464 seconds. Call trace: [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:5141 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb79dd84 r8:00000002 r7:60000013 r6:eb79dd8c r5:8544d400 r4:8544d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8544d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abe80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8544d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb799000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c338c r4:854c3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c338c r4:84d2f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544d400 r8:84d2f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f480 r8:8027ed34 r7:eb791e60 r6:84d9d680 r5:8544d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ab780 INFO: task kworker/0:266:5141 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 82dc4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfedb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:267 state:D stack:0 pid:5143 tgid:5143 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8544e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abb80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8544e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c378c r4:854c3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c378c r4:84d2f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544e000 r8:84d2f52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f500 r8:8027ed34 r7:eb79de60 r6:84d9d700 r5:8544e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847abb80 INFO: task kworker/0:267:5143 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 83141000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:5148 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6c9d84 r8:00000002 r7:60000113 r6:eb6c9d8c r5:8544ec00 r4:8544ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8544ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e48a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8544ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0021000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546df8c r4:8546dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546df8c r4:84d9d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544ec00 r8:84d9d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d9d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d9d780 r8:8027ed34 r7:eb67de60 r6:84d9d800 r5:8544ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84e48740 INFO: task kworker/1:742:5148 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 83141000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:5150 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:84d9d880 r8:8027ed34 r7:eb67de60 r6:84d9d900 r5:85500000 Workqueue: events bpf_prog_free_deferred r4:e0839dc0 r5:00001000 r4:dfedb000 r4:84345c80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918644 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:85500c00 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abc40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85500c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546ef8c r4:8546ec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546ef8c r4:84d9d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85500c00 r8:84d9d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d9d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d9d980 r8:8027ed34 r7:eb7b5e60 r6:84d9da00 r5:85500c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:82ac11e4 r4:00000000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84d28640 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e48f00 r10:00000000 r9:84d9da80 r8:8027ed34 r7:eb7bde60 r6:84d9db00 r5:85501800 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:746:5157 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7c5d84 r8:00000002 r7:60000113 r6:eb7c5d8c r5:85502400 r4:85502400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85502400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db7cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85502400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546f38c r4:8546f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8546f38c r4:84d9db80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85502400 r8:84d9dbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d9db80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d9db80 r8:8027ed34 r7:eb7bde60 r6:84d9dc00 r5:85502400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84db7c80 INFO: task kworker/1:746:5157 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:747:5158 blocked for more than 464 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:85503000 r8:84d9dcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:80070013 r4:80239bd0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:5160 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7c9d84 r8:00000002 r7:60000113 r6:eb7c9d8c r5:85503c00 r4:85503c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85503c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500bc00 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb7c9fb0 to 0xeb7c9ff8) task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:84d28640 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7cdd84 r8:00000002 r7:60000113 r6:eb7cdd8c r5:85504800 r4:85504800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85504800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85504800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85485b8c r4:85485800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85485b8c r4:84d2f600 r10:61c88647 r9:85504800 r8:84d2f62c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 843c7000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:00000000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85505400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5164 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7d9d84 r8:00000002 r7:60000013 r6:eb7d9d8c r5:85506000 r4:85506000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85506000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d35500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85506000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf83000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546ff8c r4:8546fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:85508000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r7:ddde2d40 r6:83018200 r5:842e9b8c r4:8501a080 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:5168 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:5168 tgid:5168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7d5d84 r8:00000002 r7:60000113 r6:eb7d5d8c r5:85508c00 r4:85508c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85508c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d35980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85508c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548438c r4:85484000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548438c r4:8501a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85508c00 r8:8501a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501a180 r8:8027ed34 r7:eb7dde60 r6:8501a200 r5:85508c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d354c0 INFO: task kworker/1:751:5168 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 84d6c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfedb000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:752 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d35ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85509800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548478c r4:85484400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548478c r4:8501a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85509800 r8:8501a2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501a280 r8:8027ed34 r7:eb7d5e60 r6:8501a300 r5:85509800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d356c0 INFO: task kworker/1:752:5170 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 85223000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8501a380 Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) r4:84d356c0 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5174 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7e9d84 r8:00000002 r7:60000113 r6:eb7e9d8c r5:8550b000 r4:8550b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d35e00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb241000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85484f8c r4:85484c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85484f8c r4:8501a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550b000 r8:8501a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501a480 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 857f2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:dfedb000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8548578c r4:8501a580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550bc00 r8:8501a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501a580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501a580 r8:8027ed34 r7:eb7e9e60 r6:8501a600 r5:8550bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d35bc0 INFO: task kworker/1:755:5176 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 857f2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5177 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7f5d84 r8:00000002 r7:60000013 r6:eb7f5d8c r5:8550c800 r4:8550c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d35f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550c800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548538c r4:85485000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548538c r4:8501a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550c800 r8:8501a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501a680 r8:8027ed34 r7:eb7ede60 r6:8501a700 r5:8550c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d35bc0 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d900 r9:83018205 r8:8550d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548638c r4:85486000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548638c r4:8501a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550d400 r8:8501a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501a780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501a780 r8:8027ed34 r7:eb7ede60 r6:8501a800 r5:8550d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d080 INFO: task kworker/1:757:5180 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 85d5e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8550e000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:5184 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:5184 tgid:5184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb7fdd84 r8:00000002 r7:60000113 r6:eb7fdd8c r5:84d04800 r4:84d04800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84d04800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527a040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d04800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c4b8c r4:854c4800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c4b8c r4:84d2f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d04800 r8:84d2f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f680 r8:8027ed34 r7:eb7c9e60 r6:84d2f700 r5:84d04800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7fdfb0 to 0xeb7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8500ba80 INFO: task kworker/0:270:5184 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500be00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c3f8c r4:854c3c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c3f8c r4:84d2f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d03c00 r8:84d2f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f780 r8:8027ed34 r7:eb7fde60 r6:84d2f800 r5:84d03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8500ba80 INFO: task kworker/0:271:5185 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 86ef7000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:272 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb805fb0 to 0xeb805ff8) r4:8500bc80 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:273 state:D stack:0 pid:5190 tgid:5190 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500b000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d06000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb609000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c478c r4:854c4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c478c r4:84d2f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d06000 r8:84d2f9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2f980 r8:8027ed34 r7:eb7fde60 r6:84d2fa00 r5:84d06000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8500bd80 INFO: task kworker/0:273:5190 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 87290000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5191 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb811d84 r8:00000002 r7:60000013 r6:eb811d8c r5:84d06c00 r4:84d06c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84d06c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528db80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85486b8c r4:85486800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85486b8c r4:8501a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d06c00 r8:8501a9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501a980 r8:8027ed34 r7:eb7f1e60 r6:84d2fa80 r5:84d06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8528d780 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528da80 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 876b4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5195 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb819d84 r8:00000002 r7:60000013 r6:eb819d8c r5:84d00c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:61c88647 r9:84d00c00 r8:8501aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfedb000 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528de80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d02400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb631000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85486f8c r4:85486c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85486f8c r4:8501ab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d02400 r8:8501ab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501ab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501ab00 r8:8027ed34 r7:eb819e60 r6:84d2fc00 r5:84d02400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d980 INFO: task kworker/1:762:5198 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:82ac11e4 r4:00000000 r5:850ec38c r4:850ec000 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 INFO: task kworker/0:274:5199 blocked for more than 464 seconds. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb81de08 r9:83018005 r8:84d01800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 r10:61c88647 r9:84d01800 r8:84d2fcac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb825d84 r8:00000002 r7:60000113 r6:eb825d8c r5:85506c00 r4:85506c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85506c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557a4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85506c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c538c r4:854c5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c538c r4:84d2fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85506c00 r8:84d2fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d2fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2fd80 r8:8027ed34 r7:eb81de60 r6:84d2fe00 r5:85506c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb825fb0 to 0xeb825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8527a0c0 INFO: task kworker/0:275:5201 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 87ff7000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:763 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d480 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5206 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb695d84 r8:00000002 r7:60000013 r6:eb695d8c r5:84e20c00 r4:84e20c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e20c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49db000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84e20c00 r8:8501ac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:765 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918644 r9:eb699d84 r8:00000002 r7:60000113 r6:eb699d8c r5:84e21800 r4:84e21800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e21800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e48d80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e21800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0605000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85487b8c r4:85487800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85487b8c r4:8501ac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e21800 r8:8501acac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501ac80 r8:8027ed34 r7:eb695e60 r6:84d2ff80 r5:84e21800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528d300 INFO: task kworker/1:765:5207 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 9d20: 8838e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5210 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6a5d84 r8:00000002 r7:60000013 r6:eb6a5d8c r5:84e22400 r4:84e22400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e22400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ea80 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8501ad00 r8:8027ed34 r7:eb695e60 r6:8528c000 r5:84e22400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e23000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fc78c r4:854fc400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fc78c r4:8501ae00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e23000 r8:8501ae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501ae00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501ae00 r8:8027ed34 r7:eb6a5e60 r6:8528c100 r5:84e23000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb709fb0 to 0xeb709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529e180 INFO: task kworker/1:768:5213 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 88b34000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:769:5215 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:769 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8501ae80 r8:8027ed34 r7:eb6a5e60 r6:8528c180 r5:84e23c00 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfedb000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5218 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb82dd84 r8:00000002 r7:60000113 r6:eb82dd8c r5:84e26000 r4:84e26000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e26000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb82de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e6c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e26000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fcf8c r4:854fcc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fcf8c r4:8501af00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e26000 r8:8501af2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501af00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501af00 r8:8027ed34 r7:eb6a5e60 r6:8528c200 r5:84e26000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529e540 INFO: task kworker/1:770:5218 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 88c0c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:771 state:D stack:0 pid:5219 tgid:5219 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb831e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb831fb0 to 0xeb831ff8) r4:8529e540 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5221 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb839d84 r8:00000002 r7:60000113 r6:eb839d8c r5:85498c00 r4:85498c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85498c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529e900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85498c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb161000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fd78c r4:854fd400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fd78c r4:85284000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85498c00 r8:8528402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284000 r8:8027ed34 r7:eb6a5e60 r6:8528c300 r5:85498c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb839fb0 to 0xeb839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529e7c0 INFO: task kworker/1:772:5221 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 89294000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5224 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5224 tgid:5224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb845d84 r8:00000002 r7:60000013 r6:eb845d8c r5:85499800 r4:85499800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85499800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ebc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85499800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fdf8c r4:854fdc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fdf8c r4:85284080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85499800 r8:852840ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284080 r8:8027ed34 r7:eb6a5e60 r6:8528c380 r5:85499800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529e880 INFO: task kworker/1:773:5224 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 896d5000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:5226 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb84dd84 r8:00000002 r7:60000113 r6:eb84dd8c r5:8549b000 r4:8549b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb84de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ee80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549b000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fe78c r4:854fe400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fe78c r4:85284100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549b000 r8:8528412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284100 r8:8027ed34 r7:eb845e60 r6:8528c400 r5:8549b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529ea40 INFO: task kworker/1:774:5226 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 89718000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:5227 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:775 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb855d84 r8:00000002 r7:60000013 r6:eb855d8c r5:8549a400 r4:8549a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ecc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fe38c r4:854fe000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fe38c r4:85284180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549a400 r8:852841ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284180 r8:8027ed34 r7:eb84de60 r6:8528c480 r5:8549a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529ea40 INFO: task kworker/1:775:5227 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 899a2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:5231 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb859d84 r8:00000002 r7:60000113 r6:eb859d8c r5:8549c800 r4:8549c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ef80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549c800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb265000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854feb8c r4:854fe800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854feb8c r4:85284200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549c800 r8:8528422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284200 r8:8027ed34 r7:eb84de60 r6:8528c500 r5:8549c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb859fb0 to 0xeb859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529eac0 INFO: task kworker/1:776:5231 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 899a2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5233 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5233 tgid:5233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb85dd84 r8:00000002 r7:60000113 r6:eb85dd8c r5:8549d400 r4:8549d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d35180 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549d400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fef8c r4:854fec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fef8c r4:85284280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549d400 r8:852842ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284280 r8:8027ed34 r7:eb859e60 r6:8528c580 r5:8549d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529ed80 INFO: task kworker/1:777:5233 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 89e93000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:778:5236 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:778 state:D stack:0 pid:5236 tgid:5236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb869d84 r8:00000002 r7:60000113 r6:eb869d8c r5:85498000 r4:85498000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85498000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500b100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85498000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ff38c r4:854ff000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ff38c r4:85284300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85498000 r8:8528432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284300 r8:8027ed34 r7:eb85de60 r6:8528c600 r5:85498000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8500b380 INFO: task kworker/1:778:5236 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8a32e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5237 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb86dd84 r8:00000002 r7:60000013 r6:eb86dd8c r5:8549bc00 r4:8549bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85575980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553938c r4:85539000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553938c r4:85284380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549bc00 r8:852843ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284380 r8:8027ed34 r7:eb869e60 r6:8528c680 r5:8549bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529efc0 INFO: task kworker/1:779:5237 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8a32e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:5239 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb875d84 r8:00000002 r7:60000113 r6:eb875d8c r5:84e26c00 r4:84e26c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e26c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528dec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ff78c r4:854ff400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ff78c r4:85284400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e26c00 r8:8528442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284400 r8:8027ed34 r7:eb86de60 r6:8528c700 r5:84e26c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528dc00 INFO: task kworker/1:780:5239 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8a72b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5240 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:8549ec00 r4:8549ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85575040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb405000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ffb8c r4:854ff800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ffb8c r4:85284480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549ec00 r8:852844ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284480 r8:8027ed34 r7:eb86de60 r6:8528c780 r5:8549ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8527af80 INFO: task kworker/1:781:5240 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8a72b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5242 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb881d84 r8:00000002 r7:60000013 r6:eb881d8c r5:84df0c00 r4:84df0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855752c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb561000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fff8c r4:854ffc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fff8c r4:85284500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df0c00 r8:8528452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284500 r8:8027ed34 r7:eb86de60 r6:8528c800 r5:84df0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85575000 INFO: task kworker/1:782:5242 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8a72b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5244 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb889d84 r8:00000002 r7:60000013 r6:eb889d8c r5:84df0000 r4:84df0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85575400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df0000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553838c r4:85538000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553838c r4:85284580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df0000 r8:852845ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284580 r8:8027ed34 r7:eb86de60 r6:8528c880 r5:84df0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb889fb0 to 0xeb889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85575140 INFO: task kworker/1:783:5244 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8ab29000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5247 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:84df1800 r4:84df1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85575540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df1800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553878c r4:85538400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553878c r4:85284600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df1800 r8:8528462c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284600 r8:8027ed34 r7:eb86de60 r6:8528c900 r5:84df1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85575280 INFO: task kworker/1:784:5247 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8ab29000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:785:5248 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:785 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb899d84 r8:00000002 r7:60000113 r6:eb899d8c r5:84df2400 r4:84df2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855756c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb687000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85538b8c r4:85538800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85538b8c r4:85284680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df2400 r8:852846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284680 r8:8027ed34 r7:eb86de60 r6:8528c980 r5:84df2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855753c0 INFO: task kworker/1:785:5248 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8ae9f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5251 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5251 tgid:5251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8a1d84 r8:00000002 r7:60000013 r6:eb8a1d8c r5:84df3000 r4:84df3000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:787:5252 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:787 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8a5d84 r8:00000002 r7:60000013 r6:eb8a5d8c r5:84df4800 r4:84df4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85575ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df4800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553978c r4:85539400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553978c r4:85284780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df4800 r8:852847ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284780 r8:8027ed34 r7:eb86de60 r6:8528ca80 r5:84df4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855755c0 INFO: task kworker/1:787:5252 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8b629000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:5255 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8a9d84 r8:00000002 r7:60000013 r6:eb8a9d8c r5:84df5400 r4:84df5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85575bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df5400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85539b8c r4:85539800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85539b8c r4:85284800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df5400 r8:8528482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284800 r8:8027ed34 r7:eb8a5e60 r6:8528cb00 r5:84df5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85575640 INFO: task kworker/1:788:5255 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8b720000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8553a38c r4:8553a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553a38c r4:85284880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df6c00 r8:852848ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284880 r8:8027ed34 r7:eb8a9e60 r6:8528cb80 r5:84df6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b1fb0 to 0xeb8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855759c0 INFO: task kworker/1:789:5257 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8bb04000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:790 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85575c40 INFO: task kworker/1:791:5261 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8be2c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5262 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:85514800 r4:85514800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85514800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527a640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85514800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85514800 r8:85284b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:85515400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558f040 r5:8553af8c r4:8553ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8c209000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5267 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8c1d84 r8:00000002 r7:60000013 r6:eb8c1d8c r5:85516000 r4:85516000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85516000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558f300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85516000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553b38c r4:8553b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553b38c r4:85284d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85516000 r8:85284d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284d00 r8:8027ed34 r7:eb8b9e60 r6:85284d80 r5:85516000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfedb000 r5:850ec38c r4:850ec000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:795 state:D stack:0 pid:5269 tgid:5269 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85513c00 r8:85284e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8c8af000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:5272 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8ddd84 r8:00000002 r7:60000113 r6:eb8ddd8c r5:85510000 r4:85510000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85510000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559f4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85510000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb953000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c578c r4:854c5400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c578c r4:8528cc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850ec38c r4:850ec000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5273 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:85510c00 r4:85510c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85510c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558fc40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554438c r4:85544000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554438c r4:85284f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85510c00 r8:85284f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85284f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85284f00 r8:8027ed34 r7:eb8bde60 r6:85591000 r5:85510c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8558f500 INFO: task kworker/1:796:5273 is blocked on a mutex likely owned by task kworker/1:336:3934. r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5274 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:eb8edd84 r8:00000002 r7:60000013 r6:eb8edd8c r5:8550ec00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558f900 r5:8553bb8c r4:8553b800 r10:61c88647 r9:8550ec00 r8:855910ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:798 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8d1d84 r8:00000002 r7:60000113 r6:eb8d1d8c r5:85516c00 r4:85516c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85516c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558fb00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85516c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553bf8c r4:8553bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553bf8c r4:85591180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85516c00 r8:855911ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591180 r8:8027ed34 r7:eb8e1e60 r6:85591200 r5:85516c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8558f840 INFO: task kworker/1:798:5277 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8d17e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:85511800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:8554478c r4:85544400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8d17e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5282 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:800 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:853f8000 r4:853f8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:853f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8d612000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:801:5283 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb91b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850ec38c r4:850ec000 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85591580 r8:8027ed34 r7:eb90de60 r6:85591600 r5:853f9800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8558ff40 INFO: task kworker/1:802:5285 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8d95c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5287 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5287 tgid:5287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb931d84 r8:00000002 r7:60000013 r6:eb931d8c r5:853fa400 r4:853fa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85545f8c r4:85545c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85545f8c r4:85591680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fa400 r8:855916ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591680 r8:8027ed34 r7:eb919e60 r6:85591700 r5:853fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb931fb0 to 0xeb931ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:855a0080 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:804 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:853fb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb933000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554578c r4:85545400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554578c r4:85591780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fb000 r8:855917ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591780 r8:8027ed34 r7:eb931e60 r6:85591800 r5:853fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb925fb0 to 0xeb925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a00c0 INFO: task kworker/1:804:5289 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8e4bd000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:853fbc00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a03c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb93f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85545b8c r4:85545800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85545b8c r4:85591880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fbc00 r8:855918ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591880 r8:8027ed34 r7:eb931e60 r6:85591900 r5:853fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a0340 INFO: task kworker/1:805:5291 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8e4bd000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb963000 r5:8554638c r4:85546000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554638c r4:85591980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fd400 r8:855919ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591980 r8:8027ed34 r7:eb931e60 r6:85591a00 r5:853fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a0300 INFO: task kworker/1:806:5293 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8e7e6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:5295 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb949d84 r8:00000002 r7:60000013 r6:eb949d8c r5:84df3c00 r4:84df3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb949e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851adcc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:854c638c r4:854c6000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a09c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554678c r4:85546400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554678c r4:85591a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df6000 r8:85591aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591a80 r8:8027ed34 r7:eb95de60 r6:8528cd80 r5:84df6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a0600 INFO: task kworker/1:807:5297 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8ea56000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:808:5299 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:808 state:D stack:0 pid:5299 tgid:5299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:855b0000 r4:855b0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85546b8c r4:85546800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85546b8c r4:85591b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0000 r8:85591b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591b00 r8:8027ed34 r7:eb96de60 r6:8528ce00 r5:855b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb97dfb0 to 0xeb97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:855a0840 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: r4:855b1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85546f8c r4:85546c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85546f8c r4:85591b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b1800 r8:85591bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591b80 r8:8027ed34 r7:eb97de60 r6:8528ce80 r5:855b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a08c0 INFO: task kworker/1:809:5301 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8f1bf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:810 state:D stack:0 pid:5303 tgid:5303 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa340 r5:8554c38c r4:8554c000 r4:85591c00 Exception stack(0xeb98dfb0 to 0xeb98dff8) r4:855a0c40 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eb991d84 r8:00000002 r7:60000013 r6:eb991d8c r5:855b3000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554738c r4:85547000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554738c r4:85591c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:85591cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591c80 r8:8027ed34 r7:eb98de60 r6:8528cf80 r5:855b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a0c40 INFO: task kworker/1:811:5304 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8f606000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:5306 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:812 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb999d84 r8:00000002 r7:60000113 r6:eb999d8c r5:855b2400 r4:855b2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e087b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554778c r4:85547400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554778c r4:85591d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:85591d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591d00 r8:8027ed34 r7:eb98de60 r6:855ac000 r5:855b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a0e80 INFO: task kworker/1:812:5306 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb9a1d84 r8:00000002 r7:60000113 r6:eb9a1d8c r5:855b3c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0340 r9:83018205 r8:855b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49cb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85547b8c r4:85547800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85547b8c r4:85591d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:85591dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591d80 r8:8027ed34 r7:eb98de60 r6:855ac080 r5:855b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a0c80 INFO: task kworker/1:813:5308 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8fa60000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eb9a9d84 r8:00000002 r7:60000013 r6:eb9a9d8c r5:855b4800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:855b4800 r8:85591e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5312 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5312 tgid:5312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9add84 r8:00000002 r7:60000113 r6:eb9add8c r5:855b6000 r4:855b6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf93000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554c78c r4:8554c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554c78c r4:85591e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6000 r8:85591eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591e80 r8:8027ed34 r7:eb98de60 r6:855ac180 r5:855b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9adfb0 to 0xeb9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa1c0 INFO: task kworker/1:815:5312 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 8fe7c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:5316 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9a5d84 r8:00000002 r7:60000013 r6:eb9a5d8c r5:855b6c00 r4:855b6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa740 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0839fb0 to 0xe0839ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:817 state:D stack:0 pid:5318 tgid:5318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9b1d84 r8:00000002 r7:60000013 r6:eb9b1d8c r5:855b5400 r4:855b5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554cb8c r4:8554c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554cb8c r4:85591f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:85591fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85591f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85591f80 r8:8027ed34 r7:eb9a5e60 r6:855ac280 r5:855b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b1fb0 to 0xeb9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa440 INFO: task kworker/1:817:5318 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 902c1000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:818 state:D stack:0 pid:5320 tgid:5320 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa8c0 r7:ddde2d40 r6:83018200 r5:8554d38c r4:855a7000 r4:855a7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7000 r8:8027ed34 r7:eb9a5e60 r6:855ac300 r5:8549e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa540 INFO: task kworker/1:818:5320 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 90532000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 task:kworker/1:819 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:855a7080 r8:8027ed34 r7:eb9b5e60 r6:855ac380 r5:84df8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:820 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84df8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84df8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554d78c r4:8554d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554d78c r4:855a7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df8c00 r8:855a712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7100 r8:8027ed34 r7:eb9b9e60 r6:855ac400 r5:84df8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa6c0 INFO: task kworker/1:820:5324 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 90c19000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:821 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 90e12000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:5328 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9cdd84 r8:00000002 r7:60000113 r6:eb9cdd8c r5:84dfa400 r4:84dfa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84dfa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84dfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb615000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554f78c r4:8554f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554f78c r4:855a7200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfa400 r8:855a722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7200 r8:8027ed34 r7:eb9b9e60 r6:855ac500 r5:84dfa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa680 INFO: task kworker/1:822:5328 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 90e12000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:5329 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9d1d84 r8:00000002 r7:60000113 r6:eb9d1d8c r5:84dfbc00 r4:84dfbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84dfbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aad40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84dfbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554e38c r4:8554e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554e38c r4:855a7280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfbc00 r8:855a72ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7280 r8:8027ed34 r7:eb9cde60 r6:855ac580 r5:84dfbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aac80 INFO: task kworker/1:823:5329 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 91000000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5331 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9d9d84 r8:00000002 r7:60000113 r6:eb9d9d8c r5:84dfb000 r4:84dfb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84dfb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aaf00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84dfb000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554e78c r4:8554e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554e78c r4:855a7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfb000 r8:855a732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7300 r8:8027ed34 r7:eb9cde60 r6:855ac600 r5:84dfb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d9fb0 to 0xeb9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aabc0 INFO: task kworker/1:824:5331 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/1:825 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 91648000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5335 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5335 tgid:5335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9e9d84 r8:00000002 r7:60000013 r6:eb9e9d8c r5:84dfec00 r4:84dfec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84dfec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557a000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0839dc0 r4:00000000 r5:850ec38c r4:850ec000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:827 state:D stack:0 pid:5337 tgid:5337 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:827:5337 is blocked on a mutex likely owned by task kworker/1:336:3934. r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:5340 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:5340 tgid:5340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9edd84 r8:00000002 r7:60000013 r6:eb9edd8c r5:853fec00 r4:853fec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554ff8c r4:8554fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554ff8c r4:855a7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fec00 r8:855a75ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7580 r8:8027ed34 r7:eb9cde60 r6:855a7600 r5:853fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf000 INFO: task kworker/1:828:5340 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 91d3c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfedb000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:829 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8554fb8c r4:8554f800 r10:00000000 r9:855a7680 r8:8027ed34 r7:eb9ede60 r6:855a7700 r5:853fc800 r4:847bf000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:5344 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9f5d84 r8:00000002 r7:60000013 r6:eb9f5d8c r5:85518000 r4:85518000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85518000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf7c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85518000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:5348 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:5348 tgid:5348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba15d84 r8:00000002 r7:60000113 r6:eba15d8c r5:8551a400 r4:8551a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8551a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8551a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c778c r4:854c7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c778c r4:855ac780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551a400 r8:855ac7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ac780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ac780 r8:8027ed34 r7:eb949e60 r6:855a7980 r5:8551a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba15fb0 to 0xeba15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851adb40 INFO: task kworker/0:278:5348 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 92655000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:5349 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba19d84 r8:00000002 r7:60000113 r6:eba19d8c r5:855b9800 r4:855b9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851adac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c678c r4:854c6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c678c r4:855ac800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b9800 r8:855ac82c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ac800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ac800 r8:8027ed34 r7:eba15e60 r6:855ac880 r5:855b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba19fb0 to 0xeba19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851adb40 INFO: task kworker/0:279:5349 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 92774000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5353 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:855ba400 r4:855ba400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855ba400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85550b8c r4:85550800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85550b8c r4:855a7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ba400 r8:855a7a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7a00 r8:8027ed34 r7:eba09e60 r6:855ac900 r5:855ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf700 INFO: task kworker/1:832:5353 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 92774000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:5354 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:833 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:855bb000 r4:855bb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855bb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfc00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba37000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85550f8c r4:85550c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85550f8c r4:855a7a80 r10:00000000 r9:855a7a80 r8:8027ed34 r7:eba35e60 r6:855ac980 r5:855bb000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5355 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5355 tgid:5355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba45d84 r8:00000002 r7:60000013 r6:eba45d8c r5:855bbc00 r4:855bbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855bbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bff00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555178c r4:85551400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555178c r4:855a7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bbc00 r8:855a7b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7b00 r8:8027ed34 r7:eba41e60 r6:855aca00 r5:855bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba45fb0 to 0xeba45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bfa80 INFO: task kworker/1:834:5355 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 92e06000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5357 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5357 tgid:5357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb979d84 r8:00000002 r7:60000113 r6:eb979d8c r5:855bc800 r4:855bc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855bc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfe40 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:855a7b80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:835:5357 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d60: 80070013 ffffffff r4:e0839dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:5362 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:855bec00 r4:855bec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855bec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e2ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb131000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c6f8c r4:854c6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c6f8c r4:855acb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bec00 r8:855acb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855acb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855acb00 r8:8027ed34 r7:eba15e60 r6:855acb80 r5:855bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ad480 INFO: task kworker/0:280:5362 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 92f28000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85551b8c r4:85551800 r10:61c88647 r9:855bd400 r8:855a7c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7c00 r8:8027ed34 r7:eba45e60 r6:855acc00 r5:855bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba85fb0 to 0xeba85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bfe00 INFO: task kworker/1:836:5364 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9321d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5365 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/1:837 state:D stack:0 pid:5365 tgid:5365 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555238c r4:85552000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555238c r4:855a7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8c00 r8:855a7cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7c80 r8:8027ed34 r7:eba85e60 r6:855acc80 r5:855b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba89fb0 to 0xeba89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bfe00 INFO: task kworker/1:837:5365 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9362d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5366 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba95d84 r8:00000002 r7:60000013 r6:eba95d8c r5:855b8000 r4:855b8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbc040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85551f8c r4:85551c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85551f8c r4:855a7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8000 r8:855a7d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7d00 r8:8027ed34 r7:eba89e60 r6:855acd00 r5:855b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0040 INFO: task kworker/1:838:5366 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5368 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:855be000 r4:855be000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855be000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba97000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555278c r4:85552400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555278c r4:855a7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855be000 r8:855a7dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7d80 r8:8027ed34 r7:eba89e60 r6:855acd80 r5:855be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0140 INFO: task kworker/1:839:5368 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 93c6a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:840:5369 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:5369 tgid:5369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:8551b000 r4:8551b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8551b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e04c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8551b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85552b8c r4:85552800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85552b8c r4:855a7e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551b000 r8:855a7e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7e00 r8:8027ed34 r7:ebaa1e60 r6:855a7e80 r5:8551b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba75fb0 to 0xeba75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0140 INFO: task kworker/1:840:5369 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 93c6a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:5373 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8551d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebacb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555378c r4:85553400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555378c r4:855a7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551d400 r8:855a7f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855a7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7f00 r8:8027ed34 r7:eba75e60 r6:855a7f80 r5:8551d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa5fb0 to 0xebaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0640 INFO: task kworker/1:841:5373 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 940a4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:5374 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba69d84 r8:00000002 r7:60000013 r6:eba69d8c r5:8551e000 r4:8551e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8551e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8551e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85552f8c r4:85552c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85552f8c r4:853e8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551e000 r8:853e802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8000 r8:8027ed34 r7:ebaa5e60 r6:853e8080 r5:8551e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0480 INFO: task kworker/1:842:5374 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 Exception stack(0xe0839d20 to 0xe0839d68) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:843:5376 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebab1d84 r8:00000002 r7:60000013 r6:ebab1d8c r5:8551ec00 r4:8551ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8551ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0700 r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555338c r4:85553000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555338c r4:853e8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551ec00 r8:853e812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8100 r8:8027ed34 r7:ebaa5e60 r6:853e8180 r5:8551ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0500 INFO: task kworker/1:843:5376 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 9d20: 944cb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:5378 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:844 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebac9d84 r8:00000002 r7:60000113 r6:ebac9d8c r5:8551c800 r4:8551c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8551c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8551c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85553f8c r4:85553c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85553f8c r4:853e8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551c800 r8:853e822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8200 r8:8027ed34 r7:ebaa5e60 r6:853e8280 r5:8551c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac9fb0 to 0xebac9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:5380 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:5380 tgid:5380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebad5d84 r8:00000002 r7:60000113 r6:ebad5d8c r5:8551bc00 r4:8551bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8551bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0ac0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 94940000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:846:5382 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:846 state:D stack:0 pid:5382 tgid:5382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebae1d84 r8:00000002 r7:60000113 r6:ebae1d8c r5:85518c00 r4:85518c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85518c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853e8400 r8:8027ed34 r7:ebac9e60 r6:853e8480 r5:85518c00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0a40 INFO: task kworker/1:846:5382 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 94d70000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:85530000 r4:85530000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85530000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85530000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555c38c r4:8555c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555c38c r4:853e8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85530000 r8:853e852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8500 r8:8027ed34 r7:ebae1e60 r6:853e8580 r5:85530000 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:848 state:D stack:0 pid:5386 tgid:5386 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85530c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0119000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555cb8c r4:8555c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555cb8c r4:853e8600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85530c00 r8:853e862c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8600 r8:8027ed34 r7:ebae1e60 r6:853e8680 r5:85530c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaedfb0 to 0xebaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0d40 INFO: task kworker/1:848:5386 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9553b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:849 state:D stack:0 pid:5388 tgid:5388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:85532400 r4:85532400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85532400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfe00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85532400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555cf8c r4:8555cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555cf8c r4:853e8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85532400 r8:853e872c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8700 r8:8027ed34 r7:ebaede60 r6:853e8780 r5:85532400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc000 INFO: task kworker/1:849:5388 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:850:5390 blocked for more than 466 seconds. task:kworker/1:850 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8555d38c r4:8555d000 r10:00000000 r9:853e8800 r8:8027ed34 r7:eb6a9e60 r6:853e8880 r5:85533c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5392 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb83dd84 r8:00000002 r7:60000013 r6:eb83dd8c r5:85534800 r4:85534800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85534800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f1540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85534800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555d78c r4:8555d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555d78c r4:853e8900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85534800 r8:853e892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8900 r8:8027ed34 r7:eb829e60 r6:853e8980 r5:85534800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f10c0 INFO: task kworker/1:851:5392 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d20: 95eaa000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:852:5394 blocked for more than 466 seconds. r10:82918644 r9:eb849d84 r8:00000002 r7:60000113 r6:eb849d8c r5:85531800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8555df8c r4:853e8a00 r10:00000000 r9:853e8a00 r8:8027ed34 r7:eb83de60 r6:853e8a80 r5:85531800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb849fb0 to 0xeb849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f1200 INFO: task kworker/1:852:5394 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 95eaa000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:853 state:D stack:0 pid:5396 tgid:5396 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:281 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c738c r4:854c7000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c738c r4:855ace00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:855ace2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ace00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ace00 r8:8027ed34 r7:eba15e60 r6:855ace80 r5:855c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e28c0 INFO: task kworker/0:281:5397 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9659b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84d28640 task:kworker/1:854 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:855f1900 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:850ec38c r4:850ec000 r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:855:5403 blocked for more than 466 seconds. r10:82918644 r9:eb915d84 r8:00000002 r7:60000113 r6:eb915d8c r5:855c2400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f1bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555e38c r4:8555e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555e38c r4:853e8c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c2400 r8:853e8cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8c80 r8:8027ed34 r7:eb8fde60 r6:855acf80 r5:855c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f1a40 INFO: task kworker/1:855:5403 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9687c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:856 state:D stack:0 pid:5404 tgid:5404 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb213000 r10:61c88647 r9:855c3c00 r8:853e8d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:850ec38c r4:850ec000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb939e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:855f1b40 INFO: task kworker/1:857:5406 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 96dba000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:5408 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:858 state:D stack:0 pid:5408 tgid:5408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb959d84 r8:00000002 r7:60000113 r6:eb959d8c r5:855c6000 r4:855c6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556478c r4:85564400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556478c r4:853e8e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6000 r8:853e8e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e8e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8e00 r8:8027ed34 r7:eb8fde60 r6:855f7100 r5:855c6000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:859:5411 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:860:5412 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:860 state:D stack:0 pid:5412 tgid:5412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebafdd84 r8:00000002 r7:60000113 r6:ebafdd8c r5:855c0000 r4:855c0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebafde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d6000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555f78c r4:8555f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555f78c r4:853e8f00 r10:61c88647 r9:855c0000 r8:853e8f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:861:5414 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:861 state:D stack:0 pid:5414 tgid:5414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb05d84 r8:00000002 r7:60000013 r6:ebb05d8c r5:855c6c00 r4:855c6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555fb8c r4:8555f800 r10:61c88647 r9:855c6c00 r8:853e8fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 task:kworker/1:862 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:84dfe000 r4:84dfe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84dfe000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84dfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ff8c r4:8555fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555ff8c r4:855fd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfe000 r8:855fd02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fd000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd000 r8:8027ed34 r7:eb959e60 r6:855f7300 r5:84dfe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb280 INFO: task kworker/1:862:5416 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:863:5420 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:863 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:84420000 r4:84420000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84420000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84420000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556438c r4:85564000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855fd080 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 97ab6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb1dd84 r8:00000002 r7:60000113 r6:ebb1dd8c r5:84420c00 r4:84420c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84420c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84420c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb733000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556538c r4:85565000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556538c r4:855fd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84420c00 r8:855fd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd100 r8:8027ed34 r7:eb959e60 r6:855f7400 r5:84420c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb480 INFO: task kworker/1:864:5421 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:865:5422 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:865 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb21d84 r8:00000002 r7:60000113 r6:ebb21d8c r5:84421800 r4:84421800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84421800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:850ec38c r4:850ec000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:866:5424 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:866 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb29d84 r8:00000002 r7:60000113 r6:ebb29d8c r5:84423000 r4:84423000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84423000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84423000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85564f8c r4:85564c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 985b7000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:867 state:D stack:0 pid:5426 tgid:5426 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbbc0 r7:ddde2d40 r6:83018200 r5:8556578c r4:855fd280 Exception stack(0xebb31fb0 to 0xebb31ff8) r4:855fb780 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 INFO: task kworker/1:868:5429 blocked for more than 467 seconds. r4:84423c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb765000 r10:61c88647 r9:84423c00 r8:855fd32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:869:5431 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:869 state:D stack:0 pid:5431 tgid:5431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb45d84 r8:00000002 r7:60000013 r6:ebb45d8c r5:84426000 r4:84426000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84426000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbfc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84426000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556638c r4:85566000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556638c r4:855fd380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84426000 r8:855fd3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fd380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd380 r8:8027ed34 r7:ebb3de60 r6:855f7680 r5:84426000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fbb40 INFO: task kworker/1:869:5431 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/1:870 state:D stack:0 pid:5432 tgid:5432 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85565f8c r4:85565c00 r10:00000000 r9:855fd400 r8:8027ed34 r7:ebb45e60 r6:855fd480 r5:85536000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e2400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85533000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb821000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85566b8c r4:85566800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85566b8c r4:855fd500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85533000 r8:855fd52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fd500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd500 r8:8027ed34 r7:ebb45e60 r6:855fd580 r5:85533000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb49fb0 to 0xebb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fbdc0 INFO: task kworker/1:871:5434 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 99051000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:872:5437 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:872 state:D stack:0 pid:5437 tgid:5437 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:873:5440 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:873 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb4dd84 r8:00000002 r7:60000113 r6:ebb4dd8c r5:85400c00 r4:85400c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85400c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478c040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85400c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb851000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85566f8c r4:85566c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85566f8c r4:855fd700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400c00 r8:855fd72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fd700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd700 r8:8027ed34 r7:ebb49e60 r6:855fd780 r5:85400c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:874 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8556738c r4:85567000 r10:00000000 r9:855fd800 r8:8027ed34 r7:ebb4de60 r6:855fd880 r5:85401800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478c500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85402400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb885000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556778c r4:85567400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556778c r4:855fd900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85402400 r8:855fd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fd900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd900 r8:8027ed34 r7:ebb51e60 r6:855fd980 r5:85402400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb55fb0 to 0xebb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478c180 INFO: task kworker/1:875:5443 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 99a92000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5445 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5445 tgid:5445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:85403c00 r4:85403c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85403c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478c700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85403c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85567b8c r4:85567800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85567b8c r4:855fda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85403c00 r8:855fda2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fda00 r8:8027ed34 r7:ebb55e60 r6:855fda80 r5:85403c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb835fb0 to 0xeb835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478c2c0 INFO: task kworker/1:876:5445 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 99e67000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8556c78c r4:8556c400 r4:855fdb00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb91d000 r10:61c88647 r9:85406000 r8:855fdc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb65fb0 to 0xebb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478c580 INFO: task kworker/1:878:5448 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9a1c6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:5450 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb59d84 r8:00000002 r7:60000113 r6:ebb59d8c r5:84426c00 r4:84426c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84426c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85576140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84426c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8454338c r4:84543000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8454338c r4:855f7700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84426c00 r8:855f772c r7:82804d40 r6:dddced40 r5:dddced60 r4:855f7700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f7700 r8:8027ed34 r7:eba15e60 r6:855f7780 r5:84426c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb59fb0 to 0xebb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b7f80 INFO: task kworker/0:282:5450 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9a49b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfa87000 r4:855f7800 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9a49b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:879:5457 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:879 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb6dd84 r8:00000002 r7:60000013 r6:ebb6dd8c r5:84425400 r4:84425400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84425400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478cec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84425400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556c38c r4:8556c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556c38c r4:855fdd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84425400 r8:855fdd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fdd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fdd00 r8:8027ed34 r7:ebb5de60 r6:855f7900 r5:84425400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb6dfb0 to 0xebb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478cd40 INFO: task kworker/1:879:5457 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9a97b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:880:5459 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:880 state:D stack:0 pid:5459 tgid:5459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb99dd84 r8:00000002 r7:60000013 r6:eb99dd8c r5:85536c00 r4:85536c00 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb99dfb0 to 0xeb99dff8) r4:8478cdc0 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:881:5461 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:881 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9f9d84 r8:00000002 r7:60000013 r6:eb9f9d8c r5:84dfd400 r4:84dfd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84dfd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f11c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84dfd400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556cf8c r4:8556cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556cf8c r4:855fde00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfd400 r8:855fde2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fde00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fde00 r8:8027ed34 r7:eb99de60 r6:855f7a00 r5:84dfd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478cf80 INFO: task kworker/1:881:5461 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556e78c r4:8556e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556e78c r4:855fde80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e60c00 r8:855fdeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855fde80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fde80 r8:8027ed34 r7:eb9f9e60 r6:855f7a80 r5:84e60c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba11fb0 to 0xeba11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f1480 INFO: task kworker/1:882:5463 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9b710000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:5465 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba31d84 r8:00000002 r7:60000113 r6:eba31d8c r5:84e62400 r4:84e62400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e62400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d3c040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8556d38c r4:8556d000 r10:00000000 r9:855fdf00 r8:8027ed34 r7:eba11e60 r6:855f7b00 r5:84e62400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9b8dc000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:884 state:D stack:0 pid:5466 tgid:5466 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855fdf80 r8:8027ed34 r7:eba11e60 r6:855f7b80 r5:84e60000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eba65d84 r8:00000002 r7:60000113 r6:eba65d8c r5:84e63c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d3c440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556db8c r4:8556d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556db8c r4:84d12000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e63c00 r8:84d1202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12000 r8:8027ed34 r7:eba11e60 r6:855f7c00 r5:84e63c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba65fb0 to 0xeba65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3c180 INFO: task kworker/1:885:5468 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9c108000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:886 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8556df8c r4:8556dc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3c2c0 INFO: task kworker/1:886:5470 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9c559000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeba81fb0 to 0xeba81ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d3c740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e65400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2af000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556e38c r4:8556e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556e38c r4:84d12100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e65400 r8:84d1212c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12100 r8:8027ed34 r7:eba11e60 r6:855f7e00 r5:84e65400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba91fb0 to 0xeba91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3c380 INFO: task kworker/1:887:5473 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9c89e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:888 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 9d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:889:5478 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:889 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebaadd84 r8:00000002 r7:60000113 r6:ebaadd8c r5:84e66c00 r4:84e66c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e66c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d3cac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556ef8c r4:8556ec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556ef8c r4:84d12200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e66c00 r8:84d1222c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12200 r8:8027ed34 r7:eba9de60 r6:855f7f00 r5:84e66c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaadfb0 to 0xebaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3c680 INFO: task kworker/1:889:5478 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9d276000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84d28640 task:kworker/1:890 state:D stack:0 pid:5481 tgid:5481 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9d6eb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:891:5482 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:891 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:855d8c00 r4:855d8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855d8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d3ce40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb613000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556fb8c r4:8556f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556fb8c r4:84d12300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d8c00 r8:84d1232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12300 r8:8027ed34 r7:ebad1e60 r6:852a6000 r5:855d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d3c940 INFO: task kworker/1:891:5482 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9d6eb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebb71fb0 to 0xebb71ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0839d20 to 0xe0839d68) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5486 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb75d84 r8:00000002 r7:60000013 r6:ebb75d8c r5:855dbc00 r4:855dbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855dbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d3cf80 r4:00000000 r9:83018205 r8:855dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:84d12400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9dbc9000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:894 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb81e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d12480 r8:8027ed34 r7:ebb75e60 r6:852a6180 r5:855dd400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5490 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb85d84 r8:00000002 r7:60000113 r6:ebb85d8c r5:855da400 r4:855da400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855da400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855da400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba01000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564138c r4:85641000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855da400 r8:84d1252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb89e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebb89fb0 to 0xebb89ff8) r4:8478c7c0 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:850ec38c r4:850ec000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:897:5493 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:897 state:D stack:0 pid:5493 tgid:5493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb91d84 r8:00000002 r7:60000113 r6:ebb91d8c r5:855dc800 r4:855dc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855dc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f0c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85640b8c r4:85640800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85640b8c r4:84d12600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855dc800 r8:84d1262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12600 r8:8027ed34 r7:ebb85e60 r6:852a6300 r5:855dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb91fb0 to 0xebb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8557f000 INFO: task kworker/1:897:5493 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9e5cb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855de000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85640f8c r4:85640c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85640f8c r4:84d12680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855de000 r8:84d126ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12680 r8:8027ed34 r7:ebb85e60 r6:852a6380 r5:855de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb99fb0 to 0xebb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8557f000 INFO: task kworker/1:898:5495 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9e5cb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5499 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85641f8c r4:85641c00 r4:84d12700 1fa0: 00000000 00000000 00000000 00000000 r4:8557f500 INFO: task kworker/1:899:5499 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9e5cb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:900 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebba5fb0 to 0xebba5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5501 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5501 tgid:5501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb95d84 r8:00000002 r7:60000013 r6:ebb95d8c r5:85406c00 r4:85406c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85406c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f7c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85641b8c r4:85641800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85641b8c r4:84d12800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85406c00 r8:84d1282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12800 r8:8027ed34 r7:ebba1e60 r6:84d12880 r5:85406c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8557f3c0 INFO: task kworker/1:901:5501 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9ed7b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:902:5503 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:902 state:D stack:0 pid:5503 tgid:5503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9ddd84 r8:00000002 r7:60000113 r6:eb9ddd8c r5:85405400 r4:85405400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85405400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8564278c r4:85642400 r10:00000000 r9:84d12900 r8:8027ed34 r7:ebba1e60 r6:84d12980 r5:85405400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 INFO: task kworker/1:903:5507 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:903 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebbb1d84 r8:00000002 r7:60000013 r6:ebbb1d8c r5:85409800 r4:85409800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85409800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557fb40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85409800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564238c r4:85642000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564238c r4:84d12a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85409800 r8:84d12a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12a00 r8:8027ed34 r7:eb9dde60 r6:84d12a80 r5:85409800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8557f9c0 INFO: task kworker/1:903:5507 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9f35d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:285:5508 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:285 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:84e63000 r4:84e63000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e63000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fa8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e63000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84542f8c r4:84542c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84542f8c r4:852a6500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e63000 r8:852a652c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a6500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a6500 r8:8027ed34 r7:eba81e60 r6:852a6580 r5:84e63000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85576080 INFO: task kworker/0:285:5508 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9f77a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/1:904 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557ff80 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:905:5512 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:905 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebbc5d84 r8:00000002 r7:60000113 r6:ebbc5d8c r5:855e0c00 r4:855e0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855e0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557fe40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85642b8c r4:85642800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85642b8c r4:84d12b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e0c00 r8:84d12bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12b80 r8:8027ed34 r7:ebbb9e60 r6:852a6680 r5:855e0c00 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:906:5515 blocked for more than 468 seconds. r10:82918644 r9:ebbe1d84 r8:00000002 r7:60000013 r6:ebbe1d8c r5:855e3000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8557fe00 INFO: task kworker/1:906:5515 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: 9fea6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:907:5516 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:907 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebbedd84 r8:00000002 r7:60000113 r6:ebbedd8c r5:855e3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85274000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:908:5519 blocked for more than 468 seconds. r4:855e5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ebc17000 r10:61c88647 r9:855e5400 r8:84d12d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a0479000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:909:5520 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:909 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc09d84 r8:00000002 r7:60000113 r6:ebc09d8c r5:855e6000 r4:855e6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855e6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852742c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85643b8c r4:85643800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85643b8c r4:84d12d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e6000 r8:84d12dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12d80 r8:8027ed34 r7:ebc01e60 r6:852a6880 r5:855e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852741c0 INFO: task kworker/1:909:5520 is blocked on a mutex likely owned by task kworker/1:336:3934. r4:00000000 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5522 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:910 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc15d84 r8:00000002 r7:60000113 r6:ebc15d8c r5:855e2400 r4:855e2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855e2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852744c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc03000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85643f8c r4:85643c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85643f8c r4:84d12e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e2400 r8:84d12e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:911 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84d12e80 r8:8027ed34 r7:ebc01e60 r6:852a6980 r5:855e1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:912:5526 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:912 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc31d84 r8:00000002 r7:60000013 r6:ebc31d8c r5:85680000 r4:85680000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85680000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0839dc0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc3de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85274ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85680c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564938c r4:85649000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564938c r4:84d12f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85680c00 r8:84d12fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d12f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d12f80 r8:8027ed34 r7:ebc21e60 r6:852a6a80 r5:85680c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc3dfb0 to 0xebc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85274740 INFO: task kworker/1:913:5528 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a12aa000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3000 r8:8027ed34 r7:ebc3de60 r6:853e3080 r5:85408000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbadfb0 to 0xebbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85274a00 INFO: task kworker/1:914:5530 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a12aa000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:915:5532 blocked for more than 468 seconds. r4:8540b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853e3100 r8:8027ed34 r7:ebc3de60 r6:853e3180 r5:8540b000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:916:5533 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:916 state:D stack:0 pid:5533 tgid:5533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc49d84 r8:00000002 r7:60000113 r6:ebc49d8c r5:8540bc00 r4:8540bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85274c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8540bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc57000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564978c r4:85649400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564978c r4:853e3200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540bc00 r8:853e322c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3200 r8:8027ed34 r7:ebc25e60 r6:853e3280 r5:8540bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc49fb0 to 0xebc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85274bc0 INFO: task kworker/1:916:5533 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a1a36000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:917:5536 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:917 state:D stack:0 pid:5536 tgid:5536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc55d84 r8:00000002 r7:60000113 r6:ebc55d8c r5:8540c800 r4:8540c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85274f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8540c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85649f8c r4:85649c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85649f8c r4:853e3300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540c800 r8:853e332c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3300 r8:8027ed34 r7:ebc25e60 r6:853e3380 r5:8540c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc55fb0 to 0xebc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85274cc0 INFO: task kworker/1:917:5536 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a1a36000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:5539 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:5539 tgid:5539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:8540d400 r4:8540d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8540d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac65000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564af8c r4:8564ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564af8c r4:853e3400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540d400 r8:853e342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3400 r8:8027ed34 r7:ebc55e60 r6:853e3480 r5:8540d400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85274e00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a1a36000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5540 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebbd1d84 r8:00000002 r7:60000013 r6:ebbd1d8c r5:8540e000 r4:8540e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540e000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:8540e000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 r4:853e3500 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:919:5540 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/1:920 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb861d84 r8:00000002 r7:60000013 r6:eb861d8c r5:8540ec00 r4:8540ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8540ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564a78c r4:8564a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564a78c r4:853e3600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540ec00 r8:853e362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3600 r8:8027ed34 r7:ebc61e60 r6:853e3680 r5:8540ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f51c0 INFO: task kworker/1:920:5542 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a213d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:921:5544 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:921 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb909d84 r8:00000002 r7:60000013 r6:eb909d8c r5:8540a400 r4:8540a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8540a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a57000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:922:5545 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:922 state:D stack:0 pid:5545 tgid:5545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc79d84 r8:00000002 r7:60000113 r6:ebc79d8c r5:85408c00 r4:85408c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85408c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85408c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb107000 r5:8564b38c r4:8564b000 r10:00000000 r9:853e3800 r8:8027ed34 r7:ebc61e60 r6:853e3880 r5:85408c00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a2ae5000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5548 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:923:5548 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:924 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564bb8c r4:8564b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564bb8c r4:853e3a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520000 r8:853e3a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3a00 r8:8027ed34 r7:eb92de60 r6:853e3a80 r5:85520000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f55c0 INFO: task kworker/1:924:5550 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a2c1a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:925:5552 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:925 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb11d84 r8:00000002 r7:60000013 r6:ebb11d8c r5:85520c00 r4:85520c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85520c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5a00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85520c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564bf8c r4:8564bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564bf8c r4:853e3b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520c00 r8:853e3bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85521800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85521800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564c38c r4:8564c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564c38c r4:853e3c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85521800 r8:853e3cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3c80 r8:8027ed34 r7:ebb11e60 r6:853e3d00 r5:85521800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f5b80 INFO: task kworker/1:926:5554 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a3044000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Exception stack(0xe0839fb0 to 0xe0839ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:927:5556 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:927 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebb35d84 r8:00000002 r7:60000013 r6:ebb35d8c r5:85522400 r4:85522400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85522400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85522400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564c78c r4:8564c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564c78c r4:853e3b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85522400 r8:853e3b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3b00 r8:8027ed34 r7:ebb2de60 r6:853e3d80 r5:85522400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f5cc0 INFO: task kworker/1:927:5556 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:928:5558 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:928 state:D stack:0 pid:5558 tgid:5558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc85d84 r8:00000002 r7:60000113 r6:ebc85d8c r5:85682400 r4:85682400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85682400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5e40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85682400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb557000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564cf8c r4:8564cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564cf8c r4:853e3e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85682400 r8:853e3e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3e00 r8:8027ed34 r7:ebb35e60 r6:852a6b00 r5:85682400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f5a80 INFO: task kworker/1:928:5558 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a37a2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:929:5560 blocked for more than 468 seconds. r4:85683000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84dbc500 Call trace: 9d60: 80070013 ffffffff r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:930:5562 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:930 state:D stack:0 pid:5562 tgid:5562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc95d84 r8:00000002 r7:60000113 r6:ebc95d8c r5:85684800 r4:85684800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85684800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85684800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb755000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564e38c r4:8564e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564e38c r4:853e3f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85684800 r8:853e3f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e3f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3f00 r8:8027ed34 r7:ebc85e60 r6:852a6c00 r5:85684800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc95fb0 to 0xebc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f5f40 INFO: task kworker/1:930:5562 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a37a2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:931:5563 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:931 state:D stack:0 pid:5563 tgid:5563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc99d84 r8:00000002 r7:60000113 r6:ebc99d8c r5:85685400 r4:85685400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:853e3f80 r8:8027ed34 r7:ebc95e60 r6:852a6c80 r5:85685400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc99fb0 to 0xebc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f5e80 INFO: task kworker/1:931:5563 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a3b9e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:932:5565 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:932 state:D stack:0 pid:5565 tgid:5565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebca1d84 r8:00000002 r7:60000113 r6:ebca1d8c r5:85683c00 r4:85683c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85683c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85683c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb681000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564d78c r4:8564d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564d78c r4:855f8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85683c00 r8:855f802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8000 r8:8027ed34 r7:ebc95e60 r6:852a6d00 r5:85683c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca1fb0 to 0xebca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:5567 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:5567 tgid:5567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebca9d84 r8:00000002 r7:60000113 r6:ebca9d8c r5:85686c00 r4:85686c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85686c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 r5:00001000 r4:dfedb000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:934 state:D stack:0 pid:5569 tgid:5569 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85686000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564df8c r4:8564dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564df8c r4:855f8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85686000 r8:855f812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8100 r8:8027ed34 r7:ebc95e60 r6:852a6e00 r5:85686000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb1fb0 to 0xebcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f5080 INFO: task kworker/1:934:5569 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a3ed0000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:5573 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebcb5d84 r8:00000002 r7:60000113 r6:ebcb5d8c r5:855e4800 r4:855e4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855e4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:855f55c0 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:936:5575 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:936 state:D stack:0 pid:5575 tgid:5575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebcbdd84 r8:00000002 r7:60000013 r6:ebcbdd8c r5:84ca8000 r4:84ca8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ca8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f56c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ca8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564e78c r4:8564e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564e78c r4:855f8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca8000 r8:855f822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8200 r8:8027ed34 r7:ebcb5e60 r6:852a6f00 r5:84ca8000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:937 state:D stack:0 pid:5576 tgid:5576 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:937:5576 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:938:5578 blocked for more than 469 seconds. r4:84caa400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5f40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84caa400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb911000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564ff8c r4:8564fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564ff8c r4:855f8300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84caa400 r8:855f832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8300 r8:8027ed34 r7:ebcb5e60 r6:855e8000 r5:84caa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc9fb0 to 0xebcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f5700 INFO: task kworker/1:938:5578 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a49a1000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:939 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:940:5582 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:940 state:D stack:0 pid:5582 tgid:5582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebcd9d84 r8:00000002 r7:60000013 r6:ebcd9d8c r5:84cac800 r4:84cac800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cac800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cac800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564f78c r4:8564f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8564f78c r4:855f8400 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5e80 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84542b8c r4:855e8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cad400 r8:855e822c r7:82804d40 r6:dddced40 r5:dddced60 r4:855e8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e8200 r8:8027ed34 r7:eba81e60 r6:855e8280 r5:84cad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcadfb0 to 0xebcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fac00 INFO: task kworker/0:286:5586 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a590c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:5588 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebcd5d84 r8:00000002 r7:60000113 r6:ebcd5d8c r5:84cae000 r4:84cae000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cae000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd81000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8454278c r4:84542400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855e8300 r8:8027ed34 r7:eba81e60 r6:855e8380 r5:84cae000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0839d20 to 0xe0839d68) r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:942 state:D stack:0 pid:5591 tgid:5591 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84caec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565438c r4:85654000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565438c r4:855f8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84caec00 r8:855f852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8500 r8:8027ed34 r7:ebcc9e60 r6:855e8400 r5:84caec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce9fb0 to 0xebce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f5dc0 INFO: task kworker/1:942:5591 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a5d0a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:943:5593 is blocked on a mutex likely owned by task kworker/1:336:3934. r5:80070013 r4:80239bd0 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:5594 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:944 state:D stack:0 pid:5594 tgid:5594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:85681800 r4:85681800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85681800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85576b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85681800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/1:945 state:D stack:0 pid:5596 tgid:5596 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcfde08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:855f8680 r8:8027ed34 r7:ebcf1e60 r6:855e8580 r5:85690c00 Call trace: r4:82ac11e4 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918644 r9:ebd05d84 r8:00000002 r7:60000113 r6:ebd05d8c r5:85690000 r4:85690000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85690000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854112c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85690000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb25000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85654f8c r4:85654c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85654f8c r4:855f8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85690000 r8:855f872c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8700 r8:8027ed34 r7:ebcf1e60 r6:855e8600 r5:85690000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd05fb0 to 0xebd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85411200 INFO: task kworker/1:946:5598 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a69d7000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd15e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855f8780 r8:8027ed34 r7:ebcf1e60 r6:855e8680 r5:85691800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:85692400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r4:855f8800 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85411240 INFO: task kworker/1:948:5602 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a69d7000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:949:5604 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:949 state:D stack:0 pid:5604 tgid:5604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd35d84 r8:00000002 r7:60000113 r6:ebd35d8c r5:85693000 r4:85693000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85693000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85693000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565778c r4:85657400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565778c r4:855f8880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85693000 r8:855f88ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:950 state:D stack:0 pid:5606 tgid:5606 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd45e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:951:5608 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:951 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd55d84 r8:00000002 r7:60000113 r6:ebd55d8c r5:85694800 r4:85694800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85694800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85694800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd41000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565638c r4:85656000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565638c r4:855f8980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85694800 r8:855f89ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8980 r8:8027ed34 r7:ebd35e60 r6:855e8880 r5:85694800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd55fb0 to 0xebd55ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0839d20 to 0xe0839d68) r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:952 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd65e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebd65fb0 to 0xebd65ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:953:5612 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:953 state:D stack:0 pid:5612 tgid:5612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd71d84 r8:00000002 r7:60000113 r6:ebd71d8c r5:855e6c00 r4:855e6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855e6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85656b8c r4:85656800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85656b8c r4:855f8a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e6c00 r8:855f8aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8a80 r8:8027ed34 r7:ebd35e60 r6:855e8980 r5:855e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd71fb0 to 0xebd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85411b00 INFO: task kworker/1:953:5612 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a76c9000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:954 state:D stack:0 pid:5614 tgid:5614 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd85e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ebd75000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85656f8c r4:85656c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85656f8c r4:855f8b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85696c00 r8:855f8b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8b00 r8:8027ed34 r7:ebd35e60 r6:855e8a00 r5:85696c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd85fb0 to 0xebd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85411a00 INFO: task kworker/1:954:5614 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a76c9000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:955:5616 blocked for more than 469 seconds. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85696000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565738c r4:85657000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565738c r4:855f8b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85696000 r8:855f8bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8b80 r8:8027ed34 r7:ebd35e60 r6:855e8a80 r5:85696000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd89fb0 to 0xebd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85411ac0 INFO: task kworker/1:955:5616 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a7a4c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:84c90000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d20: a7a4c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:957:5621 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:957 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebaf5d84 r8:00000002 r7:60000013 r6:ebaf5d8c r5:84c91800 r4:84c91800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c91800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c91800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 r7:ddde2d40 r6:83018200 r5:85657b8c r4:855f8c00 Exception stack(0xebaf5fb0 to 0xebaf5ff8) r4:85411f80 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:958:5624 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:958 state:D stack:0 pid:5624 tgid:5624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebbcdd84 r8:00000002 r7:60000013 r6:ebbcdd8c r5:84c90c00 r4:84c90c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c90c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc2c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565838c r4:85658000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565838c r4:855f8d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c90c00 r8:855f8d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8d00 r8:8027ed34 r7:ebac5e60 r6:855e8c00 r5:84c90c00 Exception stack(0xebbcdfb0 to 0xebbcdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:959:5626 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:959 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ebbe9d84 r8:00000002 r7:60000013 r6:ebbe9d8c r5:84c93000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb629000 r10:61c88647 r9:84c93000 r8:855f8dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:960 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855f8e00 r8:8027ed34 r7:ebbe9e60 r6:855e8d00 r5:84c93c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:e0839dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ebc11d84 r8:00000002 r7:60000013 r6:ebc11d8c r5:84c95400 r4:84c95400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c95400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c95400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb017000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85658b8c r4:85658800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85658b8c r4:855f8e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c95400 r8:855f8eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8e80 r8:8027ed34 r7:ebbe9e60 r6:855e8d80 r5:84c95400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc11fb0 to 0xebc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bc280 INFO: task kworker/1:961:5629 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a84ca000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84c94800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84c94800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:855f8f00 r8:8027ed34 r7:ebbe9e60 r6:855e8e00 r5:84c94800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0839d20 to 0xe0839d68) 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:963:5633 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:963 state:D stack:0 pid:5633 tgid:5633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc45d84 r8:00000002 r7:60000113 r6:ebc45d8c r5:84c96c00 r4:84c96c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c96c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565938c r4:85659000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565938c r4:855f8f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c96c00 r8:855f8fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f8f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f8f80 r8:8027ed34 r7:ebbe9e60 r6:855e8e80 r5:84c96c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc45fb0 to 0xebc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bc580 INFO: task kworker/1:963:5633 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a8d1f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:5636 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd79d84 r8:00000002 r7:60000113 r6:ebd79d8c r5:84c92400 r4:84c92400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c92400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a6880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c92400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe73000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566978c r4:85669400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566978c r4:855e8f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c92400 r8:855e8f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855e8f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e8f00 r8:8027ed34 r7:eba81e60 r6:855e8f80 r5:84c92400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd79fb0 to 0xebd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c9280 INFO: task kworker/0:288:5636 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a8e08000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:964:5638 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:964 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc39d84 r8:00000002 r7:60000113 r6:ebc39d8c r5:84c96000 r4:84c96000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c96000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bcbc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c96000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ed000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85659b8c r4:85659800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85659b8c r4:856c8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c96000 r8:856c802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8000 r8:8027ed34 r7:ebbe9e60 r6:856cb000 r5:84c96000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bc500 INFO: task kworker/1:964:5638 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a9107000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:5639 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856cb080 r8:8027ed34 r7:ebd79e60 r6:856cb100 r5:856a8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d60: 80070013 ffffffff r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85526000 r8:856c80ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8080 r8:8027ed34 r7:ebbe9e60 r6:856c8100 r5:85526000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce1fb0 to 0xebce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bcb00 INFO: task kworker/1:965:5642 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: a9573000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:966:5644 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:966 state:D stack:0 pid:5644 tgid:5644 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8565a78c r4:8565a400 r4:856c8180 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc380 r7:ddde2d40 r6:83018200 r5:8565ab8c r4:856c8280 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:968:5648 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:968 state:D stack:0 pid:5648 tgid:5648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:85525400 r4:85525400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85525400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbc6c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85525400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9fb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565af8c r4:8565ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565af8c r4:856c8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85525400 r8:856c83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8380 r8:8027ed34 r7:ebc5de60 r6:856c8400 r5:85525400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84dbc740 INFO: task kworker/1:968:5648 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:969 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2100 r5:8565b38c r4:8565b000 r4:856c8480 Exception stack(0xebd99fb0 to 0xebd99ff8) r4:856bc740 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: aa06f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:970:5653 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:970 state:D stack:0 pid:5653 tgid:5653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd9dd84 r8:00000002 r7:60000113 r6:ebd9dd8c r5:85523c00 r4:85523c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85523c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85523c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565bb8c r4:8565b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565bb8c r4:856c8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85523c00 r8:856c85ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8580 r8:8027ed34 r7:ebd99e60 r6:856c8600 r5:85523c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd9dfb0 to 0xebd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d21c0 INFO: task kworker/1:970:5653 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:971 state:D stack:0 pid:5654 tgid:5654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebda1d84 r8:00000002 r7:60000113 r6:ebda1d8c r5:85528000 r4:85528000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85528000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85528000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba27000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565b78c r4:8565b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565b78c r4:856c8680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85528000 r8:856c86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8680 r8:8027ed34 r7:ebd9de60 r6:856c8700 r5:85528000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebda1fb0 to 0xebda1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:856d2080 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:972:5657 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:972 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebda5d84 r8:00000002 r7:60000113 r6:ebda5d8c r5:85528c00 r4:85528c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85528c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85528c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566038c r4:85660000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566038c r4:856c8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85528c00 r8:856c87ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8780 r8:8027ed34 r7:ebd9de60 r6:856c8800 r5:85528c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebda5fb0 to 0xebda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d2300 INFO: task kworker/1:972:5657 is blocked on a mutex likely owned by task kworker/1:336:3934. [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:973 state:D stack:0 pid:5658 tgid:5658 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d25c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85529800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565bf8c r4:8565bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565bf8c r4:856c8880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85529800 r8:856c88ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8880 r8:8027ed34 r7:ebda5e60 r6:856c8900 r5:85529800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebda9fb0 to 0xebda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d2440 INFO: task kworker/1:973:5658 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: aa7d8000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:974:5661 blocked for more than 469 seconds. r4:8552a400 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d28c0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: aabdf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:975:5663 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8552b000 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r9:83018205 r8:8552b000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566138c r4:85661000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566138c r4:856c8a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552b000 r8:856c8aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8a80 r8:8027ed34 r7:ebdade60 r6:856c8b00 r5:8552b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdb5fb0 to 0xebdb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d2740 INFO: task kworker/1:975:5663 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ab04d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:8552bc00 r4:82918640 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856c8b80 r8:8027ed34 r7:ebdb5e60 r6:856c8c00 r5:8552bc00 r4:856d2740 Call trace: 9d20: ab04d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebdb9fb0 to 0xebdb9ff8) INFO: task kworker/1:977:5667 is blocked on a mutex likely owned by task kworker/1:336:3934. r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ab335000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:978:5669 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:978 state:D stack:0 pid:5669 tgid:5669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebdbdd84 r8:00000002 r7:60000113 r6:ebdbdd8c r5:8552d400 r4:8552d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8552d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:979 state:D stack:0 pid:5670 tgid:5670 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:856c8e80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:980:5672 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:980 state:D stack:0 pid:5672 tgid:5672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebdc9d84 r8:00000002 r7:60000113 r6:ebdc9d8c r5:856f0000 r4:856f0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e6300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc41000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85661f8c r4:85661c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85661f8c r4:856c8f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f0000 r8:856c8fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c8f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c8f80 r8:8027ed34 r7:ebdbde60 r6:85596000 r5:856f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdc9fb0 to 0xebdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d2dc0 INFO: task kworker/1:980:5672 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: abde2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r4:e0839dc0 r5:00001000 r4:dfedb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:981:5675 blocked for more than 470 seconds. [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e6480 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebdc5fb0 to 0xebdc5ff8) r4:856e6240 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:5677 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebdcdd84 r8:00000002 r7:60000113 r6:ebdcdd8c r5:856f1800 r4:856f1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e65c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdd7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566278c r4:85662400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566278c r4:85596180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f1800 r8:855961ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596180 r8:8027ed34 r7:ebdc5e60 r6:85596200 r5:856f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdcdfb0 to 0xebdcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e6280 INFO: task kworker/1:982:5677 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:983:5679 blocked for more than 470 seconds. [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e68c0 r5:85662f8c r4:85662c00 r10:00000000 r9:85596280 r8:8027ed34 r7:ebdcde60 r6:85596300 r5:856f2400 r4:856e6440 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebdf5d84 r8:00000002 r7:60000113 r6:ebdf5d8c r5:856aa400 r4:856aa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856aa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbfd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562938c r4:85629000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562938c r4:856cb180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856aa400 r8:856cb1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856cb180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb180 r8:8027ed34 r7:ebd79e60 r6:856cb200 r5:856aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdf5fb0 to 0xebdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c9cc0 INFO: task kworker/0:290:5681 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ac5cf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ebe05d84 r8:00000002 r7:60000113 r6:ebe05d8c r5:856ac800 r4:856ac800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ac800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e6780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebde3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85662b8c r4:85662800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85662b8c r4:85596380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ac800 r8:855963ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596380 r8:8027ed34 r7:ebdd5e60 r6:856cb280 r5:856ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe05fb0 to 0xebe05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e6600 INFO: task kworker/1:984:5683 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: acc0d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/1:985 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:856ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 r10:61c88647 r9:856ab000 r8:8559642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:986 state:D stack:0 pid:5686 tgid:5686 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:ebe23000 r5:85663b8c r4:85663800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85663b8c r4:85596480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f3000 r8:855964ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596480 r8:8027ed34 r7:ebe09e60 r6:85596500 r5:856f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebde1fb0 to 0xebde1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e6840 INFO: task kworker/1:986:5686 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: acc0d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0839dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ebdf1d84 r8:00000002 r7:60000013 r6:ebdf1d8c r5:856f3c00 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8566378c r4:85596580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r4:e0839dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/1:988:5690 blocked for more than 470 seconds. r10:82918644 r9:ebe21d84 r8:00000002 r7:60000013 r6:ebe21d8c r5:856f4800 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85596680 r8:8027ed34 r7:ebde1e60 r6:85596700 r5:856f4800 r4:856e6bc0 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ad66d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:989:5693 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:989 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebe2dd84 r8:00000002 r7:60000013 r6:ebe2dd8c r5:856f5400 r4:856f5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e6e80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebe2dfb0 to 0xebe2dff8) r4:84d8a000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566878c r4:85668400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566878c r4:85596880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f6000 r8:855968ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596880 r8:8027ed34 r7:ebe21e60 r6:85596900 r5:856f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe39fb0 to 0xebe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d8a000 INFO: task kworker/1:990:5695 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ad66d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:991:5696 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:991 state:D stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918644 r9:ebe45d84 r8:00000002 r7:60000013 r6:ebe45d8c r5:856f6c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8a380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85668b8c r4:85668800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85668b8c r4:85596980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f6c00 r8:855969ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596980 r8:8027ed34 r7:ebe39e60 r6:85596a00 r5:856f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe45fb0 to 0xebe45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d8a2c0 INFO: task kworker/1:991:5696 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ad793000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:992:5698 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:992 state:D stack:0 pid:5698 tgid:5698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebe51d84 r8:00000002 r7:60000113 r6:ebe51d8c r5:856f8000 r4:856f8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8a540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe5f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85668f8c r4:85668c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85668f8c r4:85596a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f8000 r8:85596aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596a80 r8:8027ed34 r7:ebe45e60 r6:85596b00 r5:856f8000 r4:00000001 Exception stack(0xebe51fb0 to 0xebe51ff8) r4:84d8a200 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:993 state:D stack:0 pid:5699 tgid:5699 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8a780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe67000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566938c r4:85669000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566938c r4:85596b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f9800 r8:85596bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596b80 r8:8027ed34 r7:ebe51e60 r6:85596c00 r5:856f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe15fb0 to 0xebe15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d8a4c0 INFO: task kworker/1:993:5699 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: adc0a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 Not tainted 6.16.0-rc1-syzkaller #0 r4:856fb000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:ebe7f000 r7:ddde2d40 r6:83018200 r5:85669b8c r4:85596c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: adc0a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ebe5dd84 r8:00000002 r7:60000113 r6:ebe5dd8c r5:856a8c00 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85628f8c r4:856cb380 Exception stack(0xebe5dfb0 to 0xebe5dff8) r4:855a6780 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:995:5706 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:995 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebe89d84 r8:00000002 r7:60000013 r6:ebe89d8c r5:856abc00 r4:856abc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856abc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8ad00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe8b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85669f8c r4:85669c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85669f8c r4:85596d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856abc00 r8:85596dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596d80 r8:8027ed34 r7:ebe71e60 r6:856cb480 r5:856abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe89fb0 to 0xebe89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84d8a940 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 INFO: task kworker/1:996:5708 blocked for more than 470 seconds. [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566a38c r4:8566a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566a38c r4:85596e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ae000 r8:85596e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596e00 r8:8027ed34 r7:ebe89e60 r6:856cb500 r5:856ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe95fb0 to 0xebe95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d8ab00 INFO: task kworker/1:996:5708 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ae7bb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:5709 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:5709 tgid:5709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebe99d84 r8:00000002 r7:60000113 r6:ebe99d8c r5:856aec00 r4:856aec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856aec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:ebea3000 r7:ddde2d40 r6:83018200 r5:8566a78c r4:85596e80 Exception stack(0xebe99fb0 to 0xebe99ff8) task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:850ec38c r4:850ec000 r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:856ad400 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:856a9800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebebde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8a8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebeaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566ab8c r4:8566a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566ab8c r4:85596f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856a9800 r8:85596fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85596f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596f80 r8:8027ed34 r7:ebeade60 r6:856cb680 r5:856a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebebdfb0 to 0xebebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d8ae80 INFO: task kworker/1:999:5714 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: aee35000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:1000 state:D stack:0 pid:5715 tgid:5715 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ea040 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1001:5718 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1001 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8e9d84 r8:00000002 r7:60000113 r6:eb8e9d8c r5:85700000 r4:85700000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85700000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ea340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85700000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566b78c r4:8566b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566b78c r4:847b9080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85700000 r8:847b90ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9080 r8:8027ed34 r7:ebec9e60 r6:856cb780 r5:85700000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ea100 INFO: task kworker/1:1001:5718 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: af0a4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ebccdd84 r8:00000002 r7:60000113 r6:ebccdd8c r5:85700c00 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eb0bb000 r10:61c88647 r9:85700c00 r8:847b912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1003:5721 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1003 state:D stack:0 pid:5721 tgid:5721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebcedd84 r8:00000002 r7:60000113 r6:ebcedd8c r5:85701800 r4:85701800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85701800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ea500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85701800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566bb8c r4:8566b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566bb8c r4:847b9180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85701800 r8:847b91ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9180 r8:8027ed34 r7:ebccde60 r6:856cb880 r5:85701800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ea080 INFO: task kworker/1:1003:5721 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: af482000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:1004 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85702400 r8:847b922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eaac0 r5:85674f8c r4:85674c00 r10:00000000 r9:847b9280 r8:8027ed34 r7:ebccde60 r6:856cb980 r5:85704800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd39fb0 to 0xebd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ea4c0 INFO: task kworker/1:1005:5726 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b02f1000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1006:5727 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1006 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd49d84 r8:00000002 r7:60000113 r6:ebd49d8c r5:85703000 r4:85703000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85703000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ea840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85703000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8567478c r4:85674400 r4:847b9300 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd69d84 r8:00000002 r7:60000113 r6:ebd69d8c r5:85703c00 r4:85703c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85703c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ea9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85703c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85674b8c r4:85674800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85674b8c r4:847b9380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85703c00 r8:847b93ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9380 r8:8027ed34 r7:ebd39e60 r6:856cba80 r5:85703c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd69fb0 to 0xebd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ea880 INFO: task kworker/1:1007:5729 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b0976000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/1:1008 state:D stack:0 pid:5732 tgid:5732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb3bb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1009:5734 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1009 state:D stack:0 pid:5734 tgid:5734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebee5d84 r8:00000002 r7:60000013 r6:ebee5d8c r5:84c20c00 r4:84c20c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c20c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eac40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567538c r4:85675000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567538c r4:847b9480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c20c00 r8:847b94ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9480 r8:8027ed34 r7:ebedde60 r6:856cbb80 r5:84c20c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebee5fb0 to 0xebee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ea7c0 INFO: task kworker/1:1009:5734 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b0dbf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1010:5735 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1010 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebeedd84 r8:00000002 r7:60000113 r6:ebeedd8c r5:84c21800 r4:84c21800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c21800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8a980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c21800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567678c r4:85676400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567678c r4:847b9500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c21800 r8:847b952c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9500 r8:8027ed34 r7:ebedde60 r6:856cbc00 r5:84c21800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeedfb0 to 0xebeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853eaa40 INFO: task kworker/1:1010:5735 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b0dbf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1011:5737 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1011 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebef1d84 r8:00000002 r7:60000013 r6:ebef1d8c r5:84c22400 r4:84c22400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c22400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eaec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c22400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb571000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85675b8c r4:85675800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85675b8c r4:847b9580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c22400 r8:847b95ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9580 r8:8027ed34 r7:ebeede60 r6:856cbc80 r5:84c22400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebef1fb0 to 0xebef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853eae00 INFO: task kworker/1:1011:5737 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b12ff000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1012:5739 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1012 state:D stack:0 pid:5739 tgid:5739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebef5d84 r8:00000002 r7:60000013 r6:ebef5d8c r5:84c23000 r4:84c23000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c23000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c23000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85675f8c r4:85675c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85675f8c r4:847b9600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c23000 r8:847b962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9600 r8:8027ed34 r7:ebeede60 r6:856cbd00 r5:84c23000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebef5fb0 to 0xebef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853eabc0 INFO: task kworker/1:1012:5739 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b12ff000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1013:5741 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1013 state:D stack:0 pid:5741 tgid:5741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebefdd84 r8:00000002 r7:60000113 r6:ebefdd8c r5:84c24800 r4:84c24800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c24800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebefde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a60c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c24800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567638c r4:85676000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567638c r4:847b9680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c24800 r8:847b96ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9680 r8:8027ed34 r7:ebeede60 r6:856cbd80 r5:84c24800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebefdfb0 to 0xebefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a6080 INFO: task kworker/1:1013:5741 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b1788000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1014:5744 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1014 state:D stack:0 pid:5744 tgid:5744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebf09d84 r8:00000002 r7:60000013 r6:ebf09d8c r5:84c23c00 r4:84c23c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c23c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb757000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85676b8c r4:85676800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85676b8c r4:847b9700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c23c00 r8:847b972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9700 r8:8027ed34 r7:ebeede60 r6:856cbe00 r5:84c23c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf09fb0 to 0xebf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853eaf80 INFO: task kworker/1:1014:5744 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b1d42000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:5746 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1015 state:D stack:0 pid:5746 tgid:5746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebf11d84 r8:00000002 r7:60000113 r6:ebf11d8c r5:84c25400 r4:84c25400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c25400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c25400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7af000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567738c r4:85677000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567738c r4:847b9780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c25400 r8:847b97ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9780 r8:8027ed34 r7:ebf09e60 r6:856cbe80 r5:84c25400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf11fb0 to 0xebf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1040 INFO: task kworker/1:1015:5746 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b20a0000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1016:5747 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1016 state:D stack:0 pid:5747 tgid:5747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebe7dd84 r8:00000002 r7:60000013 r6:ebe7dd8c r5:856fa400 r4:856fa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb787000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85676f8c r4:85676c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85676f8c r4:847b9800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fa400 r8:847b982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9800 r8:8027ed34 r7:ebf11e60 r6:847b9880 r5:856fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe7dfb0 to 0xebe7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1040 INFO: task kworker/1:1016:5747 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b2171000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0839fb0 to 0xe0839ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb863000 r10:61c88647 r9:856fc800 r8:847b992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf0dfb0 to 0xebf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1280 INFO: task kworker/1:1017:5750 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b2171000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1018:5751 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1018 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebd01d84 r8:00000002 r7:60000113 r6:ebd01d8c r5:856fd400 r4:856fd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb883000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85677b8c r4:85677800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85677b8c r4:847b9a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fd400 r8:847b9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80070013 ffffffff r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1019:5754 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1019 state:D stack:0 pid:5754 tgid:5754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebf19d84 r8:00000002 r7:60000113 r6:ebf19d8c r5:856fe000 r4:856fe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fe000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567838c r4:85678000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567838c r4:847b9b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fe000 r8:847b9b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9b00 r8:8027ed34 r7:ebd01e60 r6:847b9b80 r5:856fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf19fb0 to 0xebf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b15c0 INFO: task kworker/1:1019:5754 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:856fec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf21e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:856fec00 r8:847b9c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1021:5759 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1021 state:D stack:0 pid:5759 tgid:5759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebf2dd84 r8:00000002 r7:60000113 r6:ebf2dd8c r5:856fbc00 r4:856fbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb935000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567878c r4:85678400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567878c r4:847b9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fbc00 r8:847b9d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9d00 r8:8027ed34 r7:ebf19e60 r6:847b9d80 r5:856fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf2dfb0 to 0xebf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1900 INFO: task kworker/1:1021:5759 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b320b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf35e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r4:851b1a40 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0839dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1023:5762 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1023 state:D stack:0 pid:5762 tgid:5762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebf1dd84 r8:00000002 r7:60000013 r6:ebf1dd8c r5:85708000 r4:85708000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85708000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1ec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85708000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb13000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85678f8c r4:85678c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85678f8c r4:847b9f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708000 r8:847b9f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b9f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9f00 r8:8027ed34 r7:ebf35e60 r6:847b9f80 r5:85708000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf1dfb0 to 0xebf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b1a40 INFO: task kworker/1:1023:5762 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b373a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ebe11d84 r8:00000002 r7:60000113 r6:ebe11d8c r5:84c26c00 r4:84c26c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c26c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85737f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562a38c r4:8562a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562a38c r4:85583000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c26c00 r8:8558302c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583000 r8:8027ed34 r7:ebdf5e60 r6:85583080 r5:84c26c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe11fb0 to 0xebe11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268700 INFO: task kworker/0:292:5812 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b373a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578e40 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebb79fb0 to 0xebb79ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b3a8b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:5827 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:5827 tgid:5827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec7e5d84 r8:00000002 r7:60000013 r6:ec7e5d8c r5:84e39800 r4:84e39800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e39800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e39800 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb641000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8454578c r4:84545400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8454578c r4:85583200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e39800 r8:8558322c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583200 r8:8027ed34 r7:ebe11e60 r6:85583280 r5:84e39800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e5fb0 to 0xec7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268c00 INFO: task kworker/0:294:5827 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b3a8b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:295 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562b38c r4:8562b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562b38c r4:85583300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e3a400 r8:8558332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583300 r8:8027ed34 r7:ec7e5e60 r6:85583380 r5:84e3a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe41fb0 to 0xebe41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85737240 INFO: task kworker/0:295:5872 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b3cc2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ec8e1d84 r8:00000002 r7:60000013 r6:ec8e1d8c r5:84e3c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8562b78c r4:85583400 Exception stack(0xec8e1fb0 to 0xec8e1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b4002000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:5943 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:5943 tgid:5943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec8e9d84 r8:00000002 r7:60000013 r6:ec8e9d8c r5:84e3b000 r4:84e3b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e3b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f16d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562bb8c r4:8562b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562bb8c r4:85583500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e3b000 r8:8558352c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583500 r8:8027ed34 r7:ec7e5e60 r6:85583580 r5:84e3b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e9fb0 to 0xec8e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:298 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570a00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f171000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562bf8c r4:8562bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562bf8c r4:85583600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e3bc00 r8:8558362c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583600 r8:8027ed34 r7:ec7e5e60 r6:85583680 r5:84e3bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeb5fb0 to 0xebeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855705c0 INFO: task kworker/0:298:5945 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b4547000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84e38000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570c00 r5:8454538c r4:84545000 r10:00000000 r9:85583700 r8:8027ed34 r7:ec7e5e60 r6:85583780 r5:84e38000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:5951 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec911d84 r8:00000002 r7:60000013 r6:ec911d8c r5:84e3ec00 r4:84e3ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e3ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570e80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f177000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84544f8c r4:84544c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84544f8c r4:85583800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e3ec00 r8:8558382c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583800 r8:8027ed34 r7:ec909e60 r6:85583880 r5:84e3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85570a80 INFO: task kworker/0:300:5951 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b4547000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:5953 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec915d84 r8:00000002 r7:60000113 r6:ec915d8c r5:8570d400 r4:8570d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8570d400 r7:00000000 r6:83018000 r5:00001000 r4:7f179000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84544b8c r4:84544800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84544b8c r4:85583900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570d400 r8:8558392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583900 r8:8027ed34 r7:ec911e60 r6:8528b100 r5:8570d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85570d00 INFO: task kworker/0:301:5953 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b4a43000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:5955 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:5955 tgid:5955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec919d84 r8:00000002 r7:60000113 r6:ec919d8c r5:8570b000 r4:8570b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570b000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb8e5000 r7:dddced40 r6:83018000 r5:8454478c r4:85583980 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85570e40 Workqueue: events bpf_prog_free_deferred 9d20: b4e78000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:5957 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:5957 tgid:5957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec91dd84 r8:00000002 r7:60000013 r6:ec91dd8c r5:85708c00 r4:85708c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85708c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1f200 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85708c00 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb975000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8454438c r4:84544000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8454438c r4:85583a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708c00 r8:85583a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583a00 r8:8027ed34 r7:ec919e60 r6:8528b200 r5:85708c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85570f80 INFO: task kworker/0:303:5957 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b4e78000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:850ec38c r4:850ec000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b5282000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:5961 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:5961 tgid:5961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec925d84 r8:00000002 r7:60000013 r6:ec925d8c r5:8570a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563838c r4:85638000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563838c r4:85583b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570a400 r8:85583b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583b00 r8:8027ed34 r7:ec921e60 r6:8528b300 r5:8570a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec925fb0 to 0xec925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26140 INFO: task kworker/0:305:5961 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b5723000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8570ec00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec929e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 task:kworker/0:307 state:D stack:0 pid:5965 tgid:5965 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8570bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8570bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85638b8c r4:85638800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85638b8c r4:85583c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570bc00 r8:85583c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583c00 r8:8027ed34 r7:ec929e60 r6:8528b400 r5:8570bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec92dfb0 to 0xec92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af080 INFO: task kworker/0:307:5965 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b5723000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:850ec38c r4:850ec000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:308 state:D stack:0 pid:5967 tgid:5967 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85583c80 r8:8027ed34 r7:ec92de60 r6:8528b480 r5:8570c800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:5969 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:5969 tgid:5969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec935d84 r8:00000002 r7:60000113 r6:ec935d8c r5:8570e000 r4:8570e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af5c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8570e000 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb67000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85638f8c r4:85638c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85638f8c r4:85583d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570e000 r8:85583d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583d00 r8:8027ed34 r7:ec931e60 r6:8528b500 r5:8570e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af3c0 INFO: task kworker/0:309:5969 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b6186000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:5971 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:5971 tgid:5971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec939d84 r8:00000002 r7:60000113 r6:ec939d8c r5:85710000 r4:85710000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85710000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85710000 r7:00000000 r6:83018000 r5:00001000 r4:7f189000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563938c r4:85639000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563938c r4:85583d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85710000 r8:85583dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85583d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583d80 r8:8027ed34 r7:ec931e60 r6:8528b580 r5:85710000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec939fb0 to 0xec939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af580 INFO: task kworker/0:310:5971 is blocked on a mutex likely owned by task kworker/1:336:3934. Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85712400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ebbf5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af6c0 INFO: task kworker/0:311:5974 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b648a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:5975 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:5975 tgid:5975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:85713000 r4:85713000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85713000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ebd5b000 r7:dddced40 r6:83018000 r5:8563ab8c r4:85583e80 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855af740 INFO: task kworker/0:312:5975 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b6907000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:5976 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e3e000 r7:00000000 r6:83018000 r5:00001000 r4:7f18f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc89000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85639f8c r4:85639c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85639f8c r4:85583f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e3e000 r8:85583f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85583f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85583f00 r8:8027ed34 r7:ec949e60 r6:85583f80 r5:84e3e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec90dfb0 to 0xec90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855afa00 INFO: task kworker/0:313:5976 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:314:5979 blocked for more than 471 seconds. r10:82918644 r9:ec941d84 r8:00000002 r7:60000013 r6:ec941d8c r5:84e3d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:314:5979 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:315 state:D stack:0 pid:5980 tgid:5980 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563a78c r4:8563a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563a78c r4:853dc100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e38c00 r8:853dc12c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dc100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dc100 r8:8027ed34 r7:ec949e60 r6:853dc180 r5:84e38c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec93dfb0 to 0xec93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855afa40 INFO: task kworker/0:315:5980 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b6db8000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:5983 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:5983 tgid:5983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918644 r9:ec951d84 r8:00000002 r7:60000113 r6:ec951d8c r5:84c20000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f3040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85778000 r7:00000000 r6:83018000 r5:00001000 r4:7f199000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebde5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563b38c r4:8563b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563b38c r4:853dc300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85778000 r8:853dc32c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dc300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dc300 r8:8027ed34 r7:ec951e60 r6:853dc380 r5:85778000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec955fb0 to 0xec955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855afe40 INFO: task kworker/0:317:5985 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b7215000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85778c00 r8:853dc42c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:318:5987 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/0:319:5989 blocked for more than 471 seconds. r4:85779800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec969e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85779800 r7:00000000 r6:83018000 r5:00001000 r4:7f19b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe31000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8563b78c r4:8563b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8563b78c r4:853dc500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85779800 r8:853dc52c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dc500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dc500 r8:8027ed34 r7:ec959e60 r6:853dc580 r5:85779800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec969fb0 to 0xec969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f3140 INFO: task kworker/0:319:5989 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b7777000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:5990 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8577a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8563bf8c r4:8563bc00 r10:00000000 r9:853dc600 r8:8027ed34 r7:ec959e60 r6:853dc680 r5:8577a400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: b7ac0000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:e0839dc0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:5994 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec961d84 r8:00000002 r7:60000013 r6:ec961d8c r5:8577b000 r4:8577b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8577b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f3a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf6b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f078c r4:857f0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f078c r4:853dc700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577b000 r8:853dc72c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dc700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dc700 r8:8027ed34 r7:ec95de60 r6:853dc780 r5:8577b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec961fb0 to 0xec961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f3600 INFO: task kworker/0:321:5994 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80070013 ffffffff r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 task:kworker/0:322 state:D stack:0 pid:5996 tgid:5996 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b7efe000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:5998 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:5998 tgid:5998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec975d84 r8:00000002 r7:60000113 r6:ec975d8c r5:8577e000 r4:8577e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8577e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec975e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855affc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ad000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f138c r4:857f1000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f138c r4:853dc900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577e000 r8:853dc92c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dc900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dc900 r8:8027ed34 r7:ec961e60 r6:853dc980 r5:8577e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:324 state:D stack:0 pid:6000 tgid:6000 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec97de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:853dca00 r8:8027ed34 r7:ec975e60 r6:853dca80 r5:8577bc00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:6001 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:6001 tgid:6001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec991d84 r8:00000002 r7:60000113 r6:ec991d8c r5:84cc8000 r4:84cc8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cc8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f3c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ab000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f0f8c r4:857f0c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f0f8c r4:853dcb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc8000 r8:853dcb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dcb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dcb00 r8:8027ed34 r7:ec975e60 r6:853dcb80 r5:84cc8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f3d40 INFO: task kworker/0:325:6001 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b8554000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:326 state:D stack:0 pid:6007 tgid:6007 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec971e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:853dcc00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84f260c0 INFO: task kworker/0:326:6007 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b86c0000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:6008 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec995d84 r8:00000002 r7:60000113 r6:ec995d8c r5:84cc9800 r4:84cc9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cc9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cc9800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f1b8c r4:857f1800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f1b8c r4:853dcd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc9800 r8:853dcd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dcd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dcd00 r8:8027ed34 r7:ec971e60 r6:853dcd80 r5:84cc9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec995fb0 to 0xec995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f3440 INFO: task kworker/0:327:6008 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b8b4a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:82ac11e4 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:6010 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:6010 tgid:6010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec999d84 r8:00000002 r7:60000013 r6:ec999d8c r5:84cca400 r4:84cca400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84cca400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cca400 r7:00000000 r6:83018000 r5:00001000 r4:7f1b3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f1f8c r4:857f1c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f1f8c r4:853dce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cca400 r8:853dce2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dce00 r8:8027ed34 r7:ec995e60 r6:853dce80 r5:84cca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec999fb0 to 0xec999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bb240 INFO: task kworker/0:328:6010 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b8c85000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84345c80 r4:00000001 Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:6012 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:85711800 r4:85711800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85711800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb7c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85711800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec981000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f238c r4:857f2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f238c r4:853dcf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85711800 r8:853dcf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853dcf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dcf00 r8:8027ed34 r7:ec999e60 r6:8528b700 r5:85711800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9cdfb0 to 0xec9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bb1c0 INFO: task kworker/0:329:6012 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b8f66000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bba00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85714800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ab000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f278c r4:857f2400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f278c r4:853dcf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85714800 r8:853dcfac r7:82804d40 r6:dddced40 r5:dddced60 r4:853dcf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dcf80 r8:8027ed34 r7:ec9cde60 r6:8528b780 r5:85714800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bb3c0 INFO: task kworker/0:330:6014 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b8f66000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 INFO: task kworker/0:331:6016 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec9ddd84 r8:00000002 r7:60000013 r6:ec9ddd8c r5:85716000 r4:85716000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85716000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbc40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85716000 r7:00000000 r6:83018000 r5:00001000 r4:7f1b9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f2b8c r4:857f2800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f2b8c r4:85020000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85716000 r8:8502002c r7:82804d40 r6:dddced40 r5:dddced60 r4:85020000 r10:00000000 r9:85020000 r8:8027ed34 r7:ec9d1e60 r6:8528b800 r5:85716000 r4:856bb880 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:6018 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:6018 tgid:6018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec9f1d84 r8:00000002 r7:60000013 r6:ec9f1d8c r5:85716c00 r4:85716c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85716c00 r8:850200ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85020080 r8:8027ed34 r7:ec9dde60 r6:8528b880 r5:85716c00 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:332:6018 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d20: b9435000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84345c80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:333:6020 blocked for more than 471 seconds. task:kworker/0:333 state:D stack:0 pid:6020 tgid:6020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eca05d84 r8:00000002 r7:60000113 r6:eca05d8c r5:85715400 r4:85715400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85715400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85715400 r7:00000000 r6:83018000 r5:00001000 r4:7f1bf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca01000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f378c r4:857f3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f378c r4:85020100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85715400 r8:8502012c r7:82804d40 r6:dddced40 r5:dddced60 r4:85020100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020100 r8:8027ed34 r7:ec9f1e60 r6:8528b900 r5:85715400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca05fb0 to 0xeca05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bbb80 INFO: task kworker/0:333:6020 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b9435000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:6022 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85020180 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:334:6022 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:6024 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:6024 tgid:6024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec989d84 r8:00000002 r7:60000113 r6:ec989d8c r5:84ccc800 r4:84ccc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ccc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ccc800 r7:00000000 r6:83018000 r5:00001000 r4:7f1c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca0d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f3b8c r4:857f3800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f3b8c r4:85020280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ccc800 r8:850202ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85020280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020280 r8:8027ed34 r7:eca05e60 r6:85020300 r5:84ccc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bbb00 INFO: task kworker/0:335:6024 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b9678000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:336:6027 blocked for more than 471 seconds. r4:84ccd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb740 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca29e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bb200 INFO: task kworker/0:337:6029 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: b9dc6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:6030 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:6030 tgid:6030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eca1dd84 r8:00000002 r7:60000113 r6:eca1dd8c r5:84ccec00 r4:84ccec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ccec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb100 r7:dddced40 r6:83018000 r5:857f838c r4:85020580 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:6032 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eca41d84 r8:00000002 r7:60000013 r6:eca41d8c r5:8577d400 r4:8577d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8577d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f6240 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca3d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f8b8c r4:857f8800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f8b8c r4:85020680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577d400 r8:850206ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85020680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020680 r8:8027ed34 r7:eca29e60 r6:85020700 r5:8577d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857ad8c0 INFO: task kworker/0:339:6032 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:6034 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:6034 tgid:6034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eca4dd84 r8:00000002 r7:60000013 r6:eca4dd8c r5:84490000 r4:84490000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84490000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f60c0 INFO: task kworker/0:340:6034 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ba3a6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:341:6036 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eca59d84 r8:00000002 r7:60000013 r6:eca59d8c r5:84491800 r4:84491800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84491800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f60c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84491800 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85020880 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r5:850ec38c r4:850ec000 r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/0:342:6039 blocked for more than 471 seconds. r10:82918644 r9:eca71d84 r8:00000002 r7:60000113 r6:eca71d8c r5:84493000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca71e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eca6d000 r5:857f978c r4:857f9400 r10:61c88647 r9:84493000 r8:850209ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85020980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020980 r8:8027ed34 r7:eca59e60 r6:85020a00 r5:84493000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f6640 INFO: task kworker/0:342:6039 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ba5c4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:6041 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca35e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85718000 r8:85020aac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: ba818000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:344 state:D stack:0 pid:6043 tgid:6043 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca85e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85020b00 r8:8027ed34 r7:eca35e60 r6:85020b80 r5:85719800 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f6840 INFO: task kworker/0:344:6043 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ba818000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:6045 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:6045 tgid:6045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eca91d84 r8:00000002 r7:60000013 r6:eca91d8c r5:84493c00 r4:84493c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84493c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84493c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d9000 r4:85020c00 Exception stack(0xeca91fb0 to 0xeca91ff8) r4:847f6b40 Call trace: r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: babf1000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:6048 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecaa9d84 r8:00000002 r7:60000013 r6:ecaa9d8c r5:84494800 r4:84494800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84494800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ecaa5000 r10:61c88647 r9:84494800 r8:85020d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/0:347 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecab5d84 r8:00000002 r7:60000113 r6:ecab5d8c r5:84492400 r4:84492400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84492400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e5400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84492400 r7:00000000 r6:83018000 r5:00001000 r4:7f1dd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fab8c r4:857fa800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fab8c r4:85020e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84492400 r8:85020e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85020e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020e00 r8:8027ed34 r7:ecaa9e60 r6:85020e80 r5:84492400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab5fb0 to 0xecab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e5100 INFO: task kworker/0:347:6050 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bae20000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:348 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac1e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecabd000 r10:61c88647 r9:84496000 r8:85020f2c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:6054 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:6054 tgid:6054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecacdd84 r8:00000002 r7:60000113 r6:ecacdd8c r5:84496c00 r4:84496c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84496c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e5cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84496c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaed000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fbb8c r4:857fb800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fbb8c r4:85184000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84496c00 r8:8518402c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184000 r8:8027ed34 r7:ecac1e60 r6:85184080 r5:84496c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e5480 INFO: task kworker/0:349:6054 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bb122000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:6056 tgid:6056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecaddd84 r8:00000002 r7:60000113 r6:ecaddd8c r5:84495400 r4:84495400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84495400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecadde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e59c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84495400 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fb38c r4:857fb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fb38c r4:85184100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84495400 r8:8518412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184100 r8:8027ed34 r7:ecacde60 r6:85184180 r5:84495400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaddfb0 to 0xecaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e5340 INFO: task kworker/0:350:6056 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bb42b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Call trace: r4:84ccbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ccbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e5ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ccbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fb78c r4:857fb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fb78c r4:85184200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ccbc00 r8:8518422c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xecaf1fb0 to 0xecaf1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:352 state:D stack:0 pid:6061 tgid:6061 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad9e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ecaf9000 r7:dddced40 r6:83018000 r5:857fbf8c r4:85184300 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e5b40 INFO: task kworker/0:352:6061 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bb92b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:6063 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:6063 tgid:6063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eca65d84 r8:00000002 r7:60000113 r6:eca65d8c r5:85790000 r4:85790000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85790000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:85790000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ed000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:354:6065 blocked for more than 472 seconds. r4:85790c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e5f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85790c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1eb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb01000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580438c r4:85804000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580438c r4:85184500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85790c00 r8:8518452c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184500 r8:8027ed34 r7:eca65e60 r6:85184580 r5:85790c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca9dfb0 to 0xeca9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e5d80 INFO: task kworker/0:354:6065 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bbd7c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:6068 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:6068 tgid:6068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb0dd84 r8:00000002 r7:60000113 r6:ecb0dd8c r5:85791800 r4:85791800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85791800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ad9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85791800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ef000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85804b8c r4:85804800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85804b8c r4:85184600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85791800 r8:8518462c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184600 r8:8027ed34 r7:eca65e60 r6:85184680 r5:85791800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb0dfb0 to 0xecb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857ad8c0 INFO: task kworker/0:355:6068 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bc0f4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:6069 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:85792400 r4:85792400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85792400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85792400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580538c r4:85805000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580538c r4:85184700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85792400 r8:8518472c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184700 r8:8027ed34 r7:ecb0de60 r6:85184780 r5:85792400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852e5fc0 INFO: task kworker/0:356:6069 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bc0f4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:6072 blocked for more than 472 seconds. task:kworker/0:357 state:D stack:0 pid:6072 tgid:6072 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85793000 r7:00000000 r6:83018000 r5:00001000 r4:7f1f1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb21000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85804f8c r4:85804c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85804f8c r4:85184800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85793000 r8:8518482c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184800 r8:8027ed34 r7:ecb19e60 r6:85184880 r5:85793000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb25fb0 to 0xecb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a51c0 INFO: task kworker/0:357:6072 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bc157000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:358 state:D stack:0 pid:6073 tgid:6073 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df903000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580578c r4:85805400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580578c r4:85184900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85793c00 r8:8518492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184900 r8:8027ed34 r7:ecb19e60 r6:85184980 r5:85793c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb31fb0 to 0xecb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5100 INFO: task kworker/0:358:6073 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bc658000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:359 state:D stack:0 pid:6076 tgid:6076 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85805b8c r4:85805800 r7:dddced40 r6:83018000 r5:85805b8c r4:85184a00 Exception stack(0xecb3dfb0 to 0xecb3dff8) r4:852a5100 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:6077 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:6077 tgid:6077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb41d84 r8:00000002 r7:60000113 r6:ecb41d8c r5:85795400 r4:85795400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85795400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85795400 r7:00000000 r6:83018000 r5:00001000 r4:7f165000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85805f8c r4:85805c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85805f8c r4:85184b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85795400 r8:85184b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184b00 r8:8027ed34 r7:ecb3de60 r6:85184b80 r5:85795400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb41fb0 to 0xecb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5440 INFO: task kworker/0:360:6077 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bc948000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:6080 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:6080 tgid:6080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb45d84 r8:00000002 r7:60000113 r6:ecb45d8c r5:85796000 r4:85796000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85796000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a58c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85796000 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580638c r4:85806000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580638c r4:85184c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85796000 r8:85184c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184c00 r8:8027ed34 r7:ecb41e60 r6:85184c80 r5:85796000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5640 INFO: task kworker/0:361:6080 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bc948000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:6081 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85796c00 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85796c00 r8:85184d2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:6083 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:6083 tgid:6083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb4dd84 r8:00000002 r7:60000013 r6:ecb4dd8c r5:84e80000 r4:84e80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e80000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e80000 r7:00000000 r6:83018000 r5:00001000 r4:7f16b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85806b8c r4:85806800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85806b8c r4:85184e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e80000 r8:85184e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85184e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85184e00 r8:8027ed34 r7:ecb49e60 r6:85184e80 r5:84e80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5900 INFO: task kworker/0:363:6083 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb51e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5d80 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5a40 INFO: task kworker/0:364:6085 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bd422000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:6088 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb55d84 r8:00000002 r7:60000013 r6:ecb55d8c r5:84e81800 r4:84e81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84e81800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567e300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e81800 r7:00000000 r6:83018000 r5:00001000 r4:7f175000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85807b8c r4:85807800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85807b8c r4:857aa000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e81800 r8:857aa02c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aa000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aa000 r8:8027ed34 r7:ecb51e60 r6:857aa080 r5:84e81800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb55fb0 to 0xecb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5c00 INFO: task kworker/0:365:6088 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bd422000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:6089 blocked for more than 472 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567e040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e83000 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb941000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580778c r4:85807400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580778c r4:857aa200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e83000 r8:857aa22c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aa200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aa200 r8:8027ed34 r7:ecb55e60 r6:857aa280 r5:84e83000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb5dfb0 to 0xecb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8567e240 INFO: task kworker/0:367:6091 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bd422000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eba39000 r10:61c88647 r9:84e84800 r8:857aa32c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567ea40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e85400 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581878c r4:85818400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581878c r4:857aa400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e85400 r8:857aa42c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aa400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aa400 r8:8027ed34 r7:ecb61e60 r6:857aa480 r5:84e85400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb69fb0 to 0xecb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8567e340 INFO: task kworker/0:369:6095 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bdb85000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:370 state:D stack:0 pid:6098 tgid:6098 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84e86c00 r8:857aa52c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb71e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebc0b000 r5:85818b8c r4:85818800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85818b8c r4:857aa600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e86000 r8:857aa62c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aa600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aa600 r8:8027ed34 r7:ecb69e60 r6:857aa680 r5:84e86000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb71fb0 to 0xecb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8567e8c0 INFO: task kworker/0:371:6101 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bdc5d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:6102 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:6102 tgid:6102 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb75e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8581938c r4:85819000 r4:857aa800 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:6107 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb79d84 r8:00000002 r7:60000013 r6:ecb79d8c r5:85798c00 r4:85798c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85798c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85798c00 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85819b8c r4:85819800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85819b8c r4:857aa900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85798c00 r8:857aa92c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aa900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aa900 r8:8027ed34 r7:ecb75e60 r6:857aa980 r5:85798c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb79fb0 to 0xecb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8567ed00 INFO: task kworker/0:374:6107 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: be620000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:6108 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:6108 tgid:6108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb7dd84 r8:00000002 r7:60000113 r6:ecb7dd8c r5:85799800 r4:85799800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85799800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567efc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85799800 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd3b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581978c r4:85819400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581978c r4:857aaa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85799800 r8:857aaa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aaa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aaa00 r8:8027ed34 r7:ecb79e60 r6:857aaa80 r5:85799800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8567ef40 INFO: task kworker/0:375:6108 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bea7d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:6111 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:6111 tgid:6111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb81d84 r8:00000002 r7:60000113 r6:ecb81d8c r5:8579a400 r4:8579a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8579a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85737800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8579a400 r7:00000000 r6:83018000 r5:00001000 r4:7f189000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85819f8c r4:85819c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85819f8c r4:857aab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8579a400 r8:857aab2c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aab00 r8:8027ed34 r7:ecb79e60 r6:857aab80 r5:8579a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb81fb0 to 0xecb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85737ac0 INFO: task kworker/0:376:6111 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bea7d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:6112 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:6112 tgid:6112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:8579b000 r4:8579b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8579b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573b100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8579b000 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe55000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581a38c r4:8581a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581a38c r4:857aac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8579b000 r8:857aac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aac00 r8:8027ed34 r7:ecb81e60 r6:857aac80 r5:8579b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8567ef40 INFO: task kworker/0:377:6112 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bf096000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:6114 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:6114 tgid:6114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:8579bc00 r4:8579bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8579bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573b300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8579bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebea1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581a78c r4:8581a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581a78c r4:857aad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8579bc00 r8:857aad2c r7:82804d40 r6:dddced40 r5:dddced60 r4:857aad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857aad00 r8:8027ed34 r7:ecb85e60 r6:857aad80 r5:8579bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8573b040 INFO: task kworker/0:378:6114 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bf5ea000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:6117 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecb8dd84 r8:00000002 r7:60000113 r6:ecb8dd8c r5:8579c800 r4:8579c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8579c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573b600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8579c800 r7:00000000 r6:83018000 r5:00001000 r4:7f191000 r4:00000001 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850ec38c r4:850ec000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb91e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8573b2c0 INFO: task kworker/0:380:6118 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: bf9a0000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:82918644 r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:8579e000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb95e08 r10:61c88647 r9:8579e000 r8:856e802c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573b8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8579ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f195000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec853000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581b78c r4:8581b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581b78c r4:856e8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8579ec00 r8:856e812c r7:82804d40 r6:dddced40 r5:dddced60 r4:856e8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e8100 r8:8027ed34 r7:ecb95e60 r6:856e8180 r5:8579ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8573b5c0 Workqueue: events bpf_prog_free_deferred 9d20: bf9a0000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d28640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573bd40 r7:dddced40 r6:83018000 r5:8581c38c r4:856e8300 Exception stack(0xecba1fb0 to 0xecba1ff8) r4:8573b940 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c02c1000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:6128 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecba5d84 r8:00000002 r7:60000013 r6:ecba5d8c r5:857a1800 r4:857a1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857a1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573bbc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f199000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb39000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581bf8c r4:8581bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581bf8c r4:856e8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a1800 r8:856e842c r7:82804d40 r6:dddced40 r5:dddced60 r4:856e8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e8400 r8:8027ed34 r7:ecba1e60 r6:856e8480 r5:857a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba5fb0 to 0xecba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8573b9c0 INFO: task kworker/0:385:6128 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c02c1000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:6131 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbbde08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856e8600 r8:8027ed34 r7:ecbb1e60 r6:856e8680 r5:857a3000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268c00 INFO: task kworker/0:387:6132 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c086f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:6134 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecbc9d84 r8:00000002 r7:60000013 r6:ecbc9d8c r5:857a3c00 r4:857a3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857a3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573bfc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:857a3c00 r8:856e872c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:6136 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:6136 tgid:6136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecbd5d84 r8:00000002 r7:60000113 r6:ecbd5d8c r5:857a4800 r4:857a4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857a4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519a300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581d38c r4:8581d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581d38c r4:856e8800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a4800 r8:856e882c r7:82804d40 r6:dddced40 r5:dddced60 r4:856e8800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e8800 r8:8027ed34 r7:ecbbde60 r6:856e8880 r5:857a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519a240 INFO: task kworker/0:389:6136 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c0c21000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:390 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecc1d000 r7:dddced40 r6:83018000 r5:8581df8c r4:856e8900 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:390:6139 is blocked on a mutex likely owned by task kworker/1:336:3934. 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:391:6140 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:6140 tgid:6140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecbedd84 r8:00000002 r7:60000013 r6:ecbedd8c r5:857a6000 r4:857a6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857a6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519a4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbe9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581d78c r4:8581d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581d78c r4:856e8a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a6000 r8:856e8a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:856e8a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e8a00 r8:8027ed34 r7:ecbe1e60 r6:856e8a80 r5:857a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbedfb0 to 0xecbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519a340 INFO: task kworker/0:391:6140 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c0fdf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:857a6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecc11000 r10:61c88647 r9:857a6c00 r8:856e8b2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519a340 INFO: task kworker/0:392:6141 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c166d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:6146 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:6146 tgid:6146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecc15d84 r8:00000002 r7:60000013 r6:ecc15d8c r5:85828000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:856e8c00 r8:8027ed34 r7:ecbe1e60 r6:856e8c80 r5:85828000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0839dc0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:394 state:D stack:0 pid:6148 tgid:6148 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519acc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85829800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc2d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581e78c r4:8581e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581e78c r4:856e8d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85829800 r8:856e8d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:856e8d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e8d00 r8:8027ed34 r7:ecc15e60 r6:856e8d80 r5:85829800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc09fb0 to 0xecc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519a8c0 INFO: task kworker/0:394:6148 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c1772000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:6151 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:6151 tgid:6151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:856e8e00 r8:8027ed34 r7:ecc09e60 r6:856e8e80 r5:8582a400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:396 state:D stack:0 pid:6153 tgid:6153 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc3de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581f38c r4:856e8f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582bc00 r8:856e8f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:856e8f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e8f00 r8:8027ed34 r7:ecc31e60 r6:856e8f80 r5:8582bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc3dfb0 to 0xecc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ac40 INFO: task kworker/0:396:6153 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c1e10000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:6155 blocked for more than 472 seconds. r10:82918644 r9:ecbf9d84 r8:00000002 r7:60000113 r6:ecbf9d8c r5:8582d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:6156 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecc65d84 r8:00000002 r7:60000013 r6:ecc65d8c r5:8582b000 r4:8582b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8582b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c0c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582b000 r7:00000000 r6:83018000 r5:00001000 r4:7f207000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581f78c r4:8581f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581f78c r4:85730100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582b000 r8:8573012c r7:82804d40 r6:dddced40 r5:dddced60 r4:85730100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85730100 r8:8027ed34 r7:ecc3de60 r6:85730180 r5:8582b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc65fb0 to 0xecc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8572c000 INFO: task kworker/0:398:6156 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c20e5000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/0:399:6159 blocked for more than 472 seconds. [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecc61000 r10:61c88647 r9:8582ec00 r8:8573022c r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8572c300 INFO: task kworker/0:399:6159 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c241a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 task:kworker/0:400 state:D stack:0 pid:6160 tgid:6160 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582e000 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581ff8c r4:8581fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8581ff8c r4:85730300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582e000 r8:8573032c r7:82804d40 r6:dddced40 r5:dddced60 r4:85730300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85730300 r8:8027ed34 r7:ecc71e60 r6:85730380 r5:8582e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc75fb0 to 0xecc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8572c000 INFO: task kworker/0:400:6160 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c241a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/0:401:6162 blocked for more than 472 seconds. Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 task:kworker/0:402 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc91e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:402:6164 is blocked on a mutex likely owned by task kworker/1:336:3934. Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c2cc5000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:6166 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:6166 tgid:6166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecc99d84 r8:00000002 r7:60000013 r6:ecc99d8c r5:8571bc00 r4:8571bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8571bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572cc00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8571bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f211000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc95000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586078c r4:85860400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586078c r4:85730600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:8573062c r7:82804d40 r6:dddced40 r5:dddced60 r4:85730600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecc99fb0 to 0xecc99ff8) INFO: task kworker/0:403:6166 is blocked on a mutex likely owned by task kworker/1:336:3934. r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918644 r9:ecca5d84 r8:00000002 r7:60000113 r6:ecca5d8c r5:8571a400 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:85730680 r8:8027ed34 r7:ecc99e60 r6:8528ba80 r5:8571a400 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed1e08 r4:00000000 r4:85730700 r4:8572cbc0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf3de08 r10:61c88647 r9:8571ec00 r8:857307ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8572cd00 INFO: task kworker/0:406:6171 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c3402000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:408:6176 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:408 state:D stack:0 pid:6176 tgid:6176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec791d84 r8:00000002 r7:60000113 r6:ec791d8c r5:85718c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ae00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85730880 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:409 state:D stack:0 pid:6178 tgid:6178 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85734340 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 Exception stack(0xe0839fb0 to 0xe0839ff8) r10:82918644 r9:ec79dd84 r8:00000002 r7:60000013 r6:ec79dd8c r5:8571c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85734140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8571c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd57000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85861f8c r4:85861c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85861f8c r4:85730980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571c800 r8:857309ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85730980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85730980 r8:8027ed34 r7:ec795e60 r6:8528bd80 r5:8571c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec79dfb0 to 0xec79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85734100 INFO: task kworker/0:410:6180 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80070013 ffffffff r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857344c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdfb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586278c r4:85862400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586278c r4:85730a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.16.0-rc1-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85713c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1bd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe8f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586378c r4:85863400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586378c r4:85730a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85713c00 r8:85730aac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:413:6186 blocked for more than 473 seconds. r5:85720000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7fde08 r5:00001000 r4:ebe27000 r4:00000001 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r4:00000001 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:6187 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec801d84 r8:00000002 r7:60000113 r6:ec801d8c r5:85720c00 r4:85720c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85720c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857346c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85862f8c r4:85730b80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85734840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85722400 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586338c r4:85863000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586338c r4:85730c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85722400 r8:85730c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85730c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85730c00 r8:8027ed34 r7:ec7e9e60 r6:8589e000 r5:85722400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec815fb0 to 0xec815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85734440 9d60: 80070013 ffffffff [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85730c80 r8:8027ed34 r7:ec7e9e60 r6:8589e080 r5:85723000 Workqueue: events bpf_prog_free_deferred r4:e0839dc0 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:417:6194 blocked for more than 473 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85734900 INFO: task kworker/0:417:6194 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c4f42000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec831e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8586438c r4:85730d80 INFO: task kworker/0:418:6196 is blocked on a mutex likely owned by task kworker/1:336:3934. r5:00001000 r4:dfedb000 r4:00000001 INFO: task kworker/0:419:6197 blocked for more than 473 seconds. Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec835d84 r8:00000002 r7:60000013 r6:ec835d8c r5:85726000 r4:85726000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85726000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec835e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a5580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85726000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec877000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586638c r4:85866000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586638c r4:85730e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85726000 r8:85730e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85730e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85730e00 r8:8027ed34 r7:ec831e60 r6:8589e200 r5:85726000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 Exception stack(0xe0839fb0 to 0xe0839ff8) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec839e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:85730e80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:dfedb000 r4:00000001 INFO: task kworker/0:421:6201 blocked for more than 473 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85734280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85721800 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec79f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85864b8c r4:85864800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85864b8c r4:85730f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85721800 r8:85730f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85730f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85730f00 r8:8027ed34 r7:ec835e60 r6:8589e300 r5:85721800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec841fb0 to 0xec841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85734dc0 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84d28640 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918644 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:85918c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r5:00001000 r4:ec7d3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c603e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:6207 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:6207 tgid:6207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec85dd84 r8:00000002 r7:60000113 r6:ec85dd8c r5:8591a400 r4:8591a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a5040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ed000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586578c r4:85865400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586578c r4:8589f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591a400 r8:8589f12c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8589f100 r8:8027ed34 r7:ec835e60 r6:8589e480 r5:8591a400 r4:858a5080 Workqueue: events bpf_prog_free_deferred 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 task:kworker/0:425 state:D stack:0 pid:6209 tgid:6209 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85919800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a5300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85919800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85865b8c r4:85865800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85865b8c r4:8589f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85919800 r8:8589f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8589f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589f180 r8:8027ed34 r7:ec835e60 r6:8589e500 r5:85919800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec865fb0 to 0xec865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a5080 INFO: task kworker/0:425:6209 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c603e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:6211 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:6211 tgid:6211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec82dd84 r8:00000002 r7:60000113 r6:ec82dd8c r5:843bc800 r4:843bc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843bc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a5440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec825000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85865f8c r4:85865c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85865f8c r4:8589f200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843bc800 r8:8589f22c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8589f200 r8:8027ed34 r7:ec835e60 r6:8589f280 r5:843bc800 r4:858a5180 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:427:6215 blocked for more than 473 seconds. r10:82918644 r9:ec869d84 r8:00000002 r7:60000113 r6:ec869d8c r5:843bd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec869e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85866b8c r4:85866800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85866b8c r4:8589f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843bd400 r8:8589f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8589f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589f300 r8:8027ed34 r7:ec835e60 r6:8589f380 r5:843bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a5700 INFO: task kworker/0:427:6215 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c7472000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 INFO: task kworker/0:428:6216 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586678c r4:85866400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586678c r4:8589f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843be000 r8:8589f42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8589f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589f400 r8:8027ed34 r7:ec869e60 r6:8589f480 r5:843be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf41fb0 to 0xebf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a5700 INFO: task kworker/0:428:6216 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c7472000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:6218 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:6218 tgid:6218 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8589f500 r8:8027ed34 r7:ec869e60 r6:8589f580 r5:843bec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8589f600 r8:8027ed34 r7:ec881e60 r6:8589e580 r5:85918000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:6222 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec8d5d84 r8:00000002 r7:60000013 r6:ec8d5d8c r5:8591bc00 r4:8591bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a5b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1df000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586738c r4:85867000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586738c r4:8589f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591bc00 r8:8589f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8589f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589f680 r8:8027ed34 r7:ec8b1e60 r6:8589e600 r5:8591bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a5980 INFO: task kworker/0:431:6222 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c7bbe000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:6223 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:6223 tgid:6223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:8591c800 r4:8591c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a5c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586778c r4:85867400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586778c r4:8589f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8589f700 r8:8027ed34 r7:ec8b1e60 r6:8589e680 r5:8591c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:e0839dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb9e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8589f780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8589f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589f800 r8:8027ed34 r7:eccb9e60 r6:8589e780 r5:8591d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85603dc0 INFO: task kworker/0:434:6228 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c8457000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6229 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eccc5d84 r8:00000002 r7:60000013 r6:eccc5d8c r5:8591e000 r4:8591e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85603700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586c38c r4:8586c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586c38c r4:8589f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591e000 r8:8589f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8589f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589f880 r8:8027ed34 r7:eccc1e60 r6:8589e800 r5:8591e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c8457000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a5d00 r10:61c88647 r9:843bbc00 r8:8589f92c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eccc9d84 r8:00000002 r7:60000013 r6:eccc9d8c r5:843b8c00 r4:00000000 r9:83018005 r8:843b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1ef000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b8c00 r8:8589fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8589fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589fa00 r8:8027ed34 r7:eccc1e60 r6:8589fa80 r5:843b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc9fb0 to 0xeccc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c88d3000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfedb000 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 task:kworker/0:438 state:D stack:0 pid:6236 tgid:6236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eccd1d84 r8:00000002 r7:60000113 r6:eccd1d8c r5:843ba400 r4:843ba400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843ba400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:843ba400 r8:8589fb2c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:dddced40 r6:83018000 r5:8586d78c r4:8589fc80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80070013 ffffffff r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8587478c r4:85874400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586db8c r4:8586d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586db8c r4:8589fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582c800 r8:8589fe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8589fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589fe00 r8:8027ed34 r7:eccd9e60 r6:8589fe80 r5:8582c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc8dfb0 to 0xecc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858bf5c0 INFO: task kworker/0:441:6243 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c8f1f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 r4:00000000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85921800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586df8c r4:8586dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586df8c r4:8589ff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85921800 r8:8589ff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8589ff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8589ff00 r8:8027ed34 r7:eccd9e60 r6:8589e880 r5:85921800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80070013 ffffffff r4:00000000 r5:00001000 r4:dfedb000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bfa40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f165000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb513000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586e38c r4:8586e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586e38c r4:8589ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85920c00 r8:8589ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:dddced40 r6:83018000 r5:8586e78c r4:85730f80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80070013 ffffffff r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:6249 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:6249 tgid:6249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eccf5d84 r8:00000002 r7:60000013 r6:eccf5d8c r5:85922400 r4:85922400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85922400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bfcc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85922400 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586eb8c r4:8586e800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:85920000 r7:00000000 r6:83018000 r5:00001000 r4:7f16b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb905000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586ef8c r4:8586ec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586ef8c r4:858ce080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85920000 r8:858ce0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858ce080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ce080 r8:8027ed34 r7:eccd9e60 r6:8589ea80 r5:85920000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccfdfb0 to 0xeccfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858bfd40 INFO: task kworker/0:446:6251 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c9a2a000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85925400 r7:00000000 r6:83018000 r5:00001000 r4:7f16d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba03000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586f38c r4:8586f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 r10:82918644 r9:ecd0dd84 r8:00000002 r7:60000113 r6:ecd0dd8c r5:85924800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0839d20 to 0xe0839d68) 9d20: c9f25000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85710c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:8586fb8c r4:8586f800 Exception stack(0xecd19fb0 to 0xecd19ff8) Workqueue: events bpf_prog_free_deferred r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858da300 r4:00000000 r9:83018005 r8:85926000 r7:00000000 r6:83018000 r5:00001000 r4:7f175000 Exception stack(0xecd1dfb0 to 0xecd1dff8) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:6262 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:6262 tgid:6262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:85923c00 r4:85923c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85923c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:858ce300 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80070013 ffffffff r4:00000000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918644 r9:ecd25d84 r8:00000002 r7:60000013 r6:ecd25d8c r5:85926c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85874f8c r4:85874c00 Exception stack(0xecd25fb0 to 0xecd25ff8) Workqueue: events bpf_prog_free_deferred r4:e0839dc0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:6266 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:6266 tgid:6266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd29d84 r8:00000002 r7:60000013 r6:ecd29d8c r5:8591ec00 r4:8591ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858da700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd3f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85874b8c r4:85874800 r7:dddced40 r6:83018000 r5:85874b8c r4:858ce400 r4:858ce400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ce400 r8:8027ed34 r7:ecd25e60 r6:8589ee00 r5:8591ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd29fb0 to 0xecd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd2de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:858da6c0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cbabe000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dab00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85929800 r7:00000000 r6:83018000 r5:00001000 r4:7f183000 r5:8587578c r4:85875400 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:00000000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r10:82918644 r9:ecd39d84 r8:00000002 r7:60000113 r6:ecd39d8c r5:8592a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dabc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8592a400 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf25000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85875b8c r4:85875800 r10:61c88647 r9:8592a400 r8:858ce5ac r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8592b000 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cc98c000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8587638c r4:858ce680 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0839d20 to 0xe0839d68) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:6281 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:6281 tgid:6281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec88dd84 r8:00000002 r7:60000113 r6:ec88dd8c r5:8592c800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:858ce700 r8:8027ed34 r7:ecd31e60 r6:85959100 r5:8592c800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:e0839dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:460 state:D stack:0 pid:6283 tgid:6283 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:8592d400 r8:858ce7ac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cd48e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca480 Exception stack(0xecd45fb0 to 0xecd45ff8) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 INFO: task kworker/0:462:6291 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:6291 tgid:6291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd49d84 r8:00000002 r7:60000013 r6:ecd49d8c r5:8592ec00 r4:8592ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8592ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8592ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f19d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85876b8c r4:85876800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85876b8c r4:858ce880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8592ec00 r8:858ce8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858ce880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ce880 r8:8027ed34 r7:ecd45e60 r6:85959280 r5:8592ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ca1c0 INFO: task kworker/0:462:6291 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cd48e000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca5c0 r5:8587738c r4:85877000 r10:61c88647 r9:85928c00 r8:858ce92c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r4:e0839dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:6294 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:6294 tgid:6294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd59d84 r8:00000002 r7:60000013 r6:ecd59d8c r5:85930000 r4:85930000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85930000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85930000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587778c r4:85877400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587778c r4:858cea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85930000 r8:858cea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858cea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858cea00 r8:8027ed34 r7:ecd55e60 r6:85959380 r5:85930000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd59fb0 to 0xecd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ca5c0 INFO: task kworker/0:464:6294 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ce385000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd61e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85931800 r7:00000000 r6:83018000 r5:00001000 r4:7f1a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85877b8c r4:85877800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85877b8c r4:858ce980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85931800 r8:858ce9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858ce980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ce980 r8:8027ed34 r7:ecd59e60 r6:85959400 r5:85931800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd61fb0 to 0xecd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ca4c0 INFO: task kworker/0:465:6297 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd69e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecb05000 r5:8587878c r4:85878400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:85932400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ca940 r9:83018005 r8:85932400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaeb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85877f8c r4:85877c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85877f8c r4:858ceb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85932400 r8:858ceb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858ceb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ceb00 r8:8027ed34 r7:ecd69e60 r6:85959500 r5:85932400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd71fb0 to 0xecd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ca7c0 INFO: task kworker/0:467:6301 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cefbf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:6302 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:6302 tgid:6302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd75d84 r8:00000002 r7:60000113 r6:ecd75d8c r5:85933c00 r4:85933c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85933c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858caa80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85933c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587838c r4:85878000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587838c r4:858ceb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85933c00 r8:858cebac r7:82804d40 r6:dddced40 r5:dddced60 r4:858ceb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ceb80 r8:8027ed34 r7:ecd69e60 r6:85959580 r5:85933c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd75fb0 to 0xecd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ca7c0 INFO: task kworker/0:468:6302 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cefbf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:469 state:D stack:0 pid:6304 tgid:6304 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd7de08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85935400 r7:00000000 r6:83018000 r5:00001000 r4:7f203000 r10:61c88647 r9:85935400 r8:858cec2c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:470 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd85e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:858cec80 r8:8027ed34 r7:ecd7de60 r6:85959680 r5:85934800 r4:858caa40 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cf775000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:6308 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:6308 tgid:6308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd8dd84 r8:00000002 r7:60000013 r6:ecd8dd8c r5:85933000 r4:85933000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85933000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858caec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85933000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb27000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85878f8c r4:85878c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85878f8c r4:858ced00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85933000 r8:858ced2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858ced00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ced00 r8:8027ed34 r7:ecd7de60 r6:85959700 r5:85933000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd8dfb0 to 0xecd8dff8) dfa0: 00000000 00000000 00000000 00000000 r4:858caa40 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r5:00001000 r4:dfedb000 r5:850ec38c r4:850ec000 r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:472:6311 blocked for more than 474 seconds. r10:82918644 r9:ecd91d84 r8:00000002 r7:60000113 r6:ecd91d8c r5:85936c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:858ced80 r8:8027ed34 r7:ecd7de60 r6:85959780 r5:85936c00 r4:858cae80 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r4:e0839dc0 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd95d84 r8:00000002 r7:60000013 r6:ecd95d8c r5:85936000 r4:85936000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85936000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bffc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85936000 r7:00000000 r6:83018000 r5:00001000 r4:7f205000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85879b8c r4:85879800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85879b8c r4:858cee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85936000 r8:858cee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858cee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858cee00 r8:8027ed34 r7:ecd7de60 r6:85959800 r5:85936000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd95fb0 to 0xecd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958fc0 INFO: task kworker/0:473:6313 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: cfe9f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:6316 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85953580 r5:8587ab8c r4:8587a800 r10:61c88647 r9:85939800 r8:858ceeac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85953040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593a400 r7:00000000 r6:83018000 r5:00001000 r4:7f207000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbcd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85879f8c r4:85879c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85879f8c r4:858cef00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593a400 r8:858cef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858cef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858cef00 r8:8027ed34 r7:ecda1e60 r6:85959900 r5:8593a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85953200 INFO: task kworker/0:475:6317 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d00be000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:6319 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:6319 tgid:6319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecdadd84 r8:00000002 r7:60000013 r6:ecdadd8c r5:85938000 r4:85938000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85938000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859532c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85938000 r7:00000000 r6:83018000 r5:00001000 r4:7f209000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587a38c r4:8587a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587a38c r4:858cef80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85938000 r8:858cefac r7:82804d40 r6:dddced40 r5:dddced60 r4:858cef80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858cef80 r8:8027ed34 r7:ecda1e60 r6:85959980 r5:85938000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdadfb0 to 0xecdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85953200 INFO: task kworker/0:476:6319 is blocked on a mutex likely owned by task kworker/1:336:3934. r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:6320 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:6320 tgid:6320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecdb1d84 r8:00000002 r7:60000113 r6:ecdb1d8c r5:85938c00 r4:85938c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85938c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85938c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587a78c r4:8587a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587a78c r4:858d7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85938c00 r8:858d702c r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7000 r8:8027ed34 r7:ecda1e60 r6:85959a00 r5:85938c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85953140 INFO: task kworker/0:477:6320 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d0566000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:6332 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6332 tgid:6332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec859d84 r8:00000002 r7:60000113 r6:ec859d8c r5:8593d400 r4:8593d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85953680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593d400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587af8c r4:8587ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587af8c r4:858db000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593d400 r8:858db02c r7:82804d40 r6:dddced40 r5:dddced60 r4:858db000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db000 r8:8027ed34 r7:ecda1e60 r6:85959a80 r5:8593d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85953500 INFO: task kworker/0:478:6332 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d09e6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:6333 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:6333 tgid:6333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd5dd84 r8:00000002 r7:60000113 r6:ecd5dd8c r5:8593e000 r4:8593e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0180 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593e000 r7:00000000 r6:83018000 r5:00001000 r4:7f171000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587cb8c r4:8587c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587cb8c r4:858db080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593e000 r8:858db0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db080 r8:8027ed34 r7:ec859e60 r6:85959b00 r5:8593e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd5dfb0 to 0xecd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85953500 INFO: task kworker/0:479:6333 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d09e6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:6337 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd89d84 r8:00000002 r7:60000113 r6:ecd89d8c r5:8593c800 r4:8593c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587b38c r4:8587b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587b38c r4:858db100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593c800 r8:858db12c r7:82804d40 r6:dddced40 r5:dddced60 r4:858db100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db100 r8:8027ed34 r7:ecd5de60 r6:85959b80 r5:8593c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd89fb0 to 0xecd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85953800 INFO: task kworker/0:480:6337 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d0dc2000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:6369 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:8593bc00 r4:8593bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0e80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb995000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587bb8c r4:8587b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587bb8c r4:858db180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593bc00 r8:858db1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db180 r8:8027ed34 r7:ecd5de60 r6:85959c00 r5:8593bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0a80 INFO: task kworker/0:481:6369 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d1494000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:6373 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:6373 tgid:6373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece15d84 r8:00000002 r7:60000113 r6:ece15d8c r5:8593ec00 r4:8593ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba51000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587bf8c r4:8587bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587bf8c r4:858db280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593ec00 r8:858db2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db280 r8:8027ed34 r7:ecd5de60 r6:85959c80 r5:8593ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece15fb0 to 0xece15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0e40 INFO: task kworker/0:482:6373 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d1494000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:6374 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:6374 tgid:6374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece19d84 r8:00000002 r7:60000013 r6:ece19d8c r5:85308000 r4:85308000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85308000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0c40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85308000 r7:00000000 r6:83018000 r5:00001000 r4:7f16b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587c38c r4:8587c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587c38c r4:858db300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308000 r8:858db32c r7:82804d40 r6:dddced40 r5:dddced60 r4:858db300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db300 r8:8027ed34 r7:ecd5de60 r6:85959d00 r5:85308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece19fb0 to 0xece19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0e40 INFO: task kworker/0:483:6374 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d21ad000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:6376 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:6376 tgid:6376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd01d84 r8:00000002 r7:60000013 r6:ecd01d8c r5:84ea5400 r4:84ea5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ea5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea5400 r7:00000000 r6:83018000 r5:00001000 r4:7f16d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbfb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587c78c r4:8587c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587c78c r4:858db380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea5400 r8:858db3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db380 r8:8027ed34 r7:ecd5de60 r6:858db400 r5:84ea5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd01fb0 to 0xecd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0fc0 INFO: task kworker/0:484:6376 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d21ad000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:6379 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:6379 tgid:6379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece21d84 r8:00000002 r7:60000013 r6:ece21d8c r5:84ea6000 r4:84ea6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ea6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a3580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea6000 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587d78c r4:8587d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587d78c r4:858db480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea6000 r8:858db4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db480 r8:8027ed34 r7:ecd5de60 r6:858db500 r5:84ea6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece21fb0 to 0xece21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0600 INFO: task kworker/0:485:6379 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d2bcb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:6380 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:6380 tgid:6380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecc49d84 r8:00000002 r7:60000013 r6:ecc49d8c r5:84ea4800 r4:84ea4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ea4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c2f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea4800 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd5d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587cf8c r4:8587cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587cf8c r4:858db580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea4800 r8:858db5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db580 r8:8027ed34 r7:ece21e60 r6:858db600 r5:84ea4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc49fb0 to 0xecc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85953d80 INFO: task kworker/0:486:6380 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d3214000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:6384 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:6384 tgid:6384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece2dd84 r8:00000002 r7:60000113 r6:ece2dd8c r5:84ea1800 r4:84ea1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ea1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a3340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea1800 r7:00000000 r6:83018000 r5:00001000 r4:7f17b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf39000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587d38c r4:8587d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587d38c r4:858db680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea1800 r8:858db6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db680 r8:8027ed34 r7:ece21e60 r6:858db700 r5:84ea1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece2dfb0 to 0xece2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a3280 INFO: task kworker/0:487:6384 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d3214000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:6387 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:6387 tgid:6387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece29d84 r8:00000002 r7:60000113 r6:ece29d8c r5:84ea3000 r4:84ea3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ea3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a39c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea3000 r7:00000000 r6:83018000 r5:00001000 r4:7f183000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca39000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587e38c r4:8587e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587e38c r4:858db780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea3000 r8:858db7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db780 r8:8027ed34 r7:ece21e60 r6:858db800 r5:84ea3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece29fb0 to 0xece29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a3400 INFO: task kworker/0:488:6387 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d37d6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:6389 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:6389 tgid:6389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece1dd84 r8:00000002 r7:60000013 r6:ece1dd8c r5:84ea3c00 r4:84ea3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ea3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a36c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f17f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ed000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587db8c r4:8587d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587db8c r4:858db880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea3c00 r8:858db8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db880 r8:8027ed34 r7:ece29e60 r6:858db900 r5:84ea3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece1dfb0 to 0xece1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a3540 INFO: task kworker/0:489:6389 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d37d6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:6391 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:6391 tgid:6391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece25d84 r8:00000002 r7:60000113 r6:ece25d8c r5:84ea0c00 r4:84ea0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ea0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a3800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca23000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587df8c r4:8587dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587df8c r4:858db980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea0c00 r8:858db9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858db980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858db980 r8:8027ed34 r7:ece29e60 r6:858dba00 r5:84ea0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece25fb0 to 0xece25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a3680 INFO: task kworker/0:490:6391 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d3c9b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:6394 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:6394 tgid:6394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece31d84 r8:00000002 r7:60000113 r6:ece31d8c r5:84ea2400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a3b00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ea2400 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587e78c r4:8587e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587e78c r4:858dba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea2400 r8:858dbaac r7:82804d40 r6:dddced40 r5:dddced60 r4:858dba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858dba80 r8:8027ed34 r7:ece29e60 r6:858dbb00 r5:84ea2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece31fb0 to 0xece31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a3840 INFO: task kworker/0:491:6394 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d4228000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece35e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:858dbb80 r8:8027ed34 r7:ece31e60 r6:858dbc00 r5:84ea0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:e0839dc0 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 task:kworker/0:493 state:D stack:0 pid:6397 tgid:6397 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece39e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587ef8c r4:858dbc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea6c00 r8:858dbcac r7:82804d40 r6:dddced40 r5:dddced60 r4:858dbc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858dbc80 r8:8027ed34 r7:ece35e60 r6:858dbd00 r5:84ea6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece39fb0 to 0xece39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858a3b40 INFO: task kworker/0:493:6397 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d46c4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:6399 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:6399 tgid:6399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece3dd84 r8:00000002 r7:60000113 r6:ece3dd8c r5:84c18000 r4:84c18000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c18000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a3fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c18000 r7:00000000 r6:83018000 r5:00001000 r4:7f191000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587f38c r4:8587f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587f38c r4:858dbd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c18000 r8:858dbdac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:858dbd80 r8:8027ed34 r7:ece39e60 r6:858dbe00 r5:84c18000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: d49df000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:6402 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:6402 tgid:6402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece41d84 r8:00000002 r7:60000013 r6:ece41d8c r5:84c18c00 r4:84c18c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c18c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a3000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f19b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587f78c r4:8587f400 r10:61c88647 r9:84c18c00 r8:858dbeac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:dfedb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ad180 r9:83018005 r8:84c19800 r7:00000000 r6:83018000 r5:00001000 r4:7f19d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587fb8c r4:8587f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587fb8c r4:858dbf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c19800 r8:858dbfac r7:82804d40 r6:dddced40 r5:dddced60 r4:858dbf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858dbf80 r8:8027ed34 r7:ece41e60 r6:858db200 r5:84c19800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece45fb0 to 0xece45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c2ec0 INFO: task kworker/0:496:6403 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d5358000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:6405 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:6405 tgid:6405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece49d84 r8:00000002 r7:60000013 r6:ece49d8c r5:84c1a400 r4:84c1a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c1a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ad2c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587ff8c r4:8587fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587ff8c r4:858d7080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c1a400 r8:858d70ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7080 r8:8027ed34 r7:ece45e60 r6:858d7100 r5:84c1a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ad000 INFO: task kworker/0:497:6405 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d5358000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r5:80070013 r4:80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ad140 INFO: task kworker/0:498:6407 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d5718000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:6409 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:6409 tgid:6409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece55d84 r8:00000002 r7:60000113 r6:ece55d8c r5:84c1bc00 r4:84c1bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c1bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ad5c0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8588478c r4:858d7280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c1bc00 r8:858d72ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7280 r8:8027ed34 r7:ece51e60 r6:858d7300 r5:84c1bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece55fb0 to 0xece55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ad240 INFO: task kworker/0:499:6409 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d5d4d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:500 state:D stack:0 pid:6410 tgid:6410 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:00001000 r4:ecb1b000 r5:85884f8c r4:85884c00 r7:dddced40 r6:83018000 r5:85884f8c r4:858d7380 r10:00000000 r9:858d7380 r8:8027ed34 r7:ece55e60 r6:858d7400 r5:84c1c800 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:850ec38c r4:850ec000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r4:84345c80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:6413 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:6413 tgid:6413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece59d84 r8:00000002 r7:60000013 r6:ece59d8c r5:84c1d400 r4:84c1d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c1d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ad780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb03000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85884b8c r4:85884800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85884b8c r4:858d7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c1d400 r8:858d74ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7480 r8:8027ed34 r7:ece4de60 r6:858d7500 r5:84c1d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece59fb0 to 0xece59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ad600 INFO: task kworker/0:501:6413 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d65fb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:6416 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:6416 tgid:6416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece5dd84 r8:00000002 r7:60000013 r6:ece5dd8c r5:84c1e000 r4:84c1e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c1e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ada40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1f3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588538c r4:85885000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588538c r4:858d7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c1e000 r8:858d75ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7580 r8:8027ed34 r7:ece4de60 r6:858d7600 r5:84c1e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece5dfb0 to 0xece5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ad740 INFO: task kworker/0:502:6416 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d65fb000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:503:6417 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece61d84 r8:00000002 r7:60000113 r6:ece61d8c r5:84c1ec00 r4:84c1ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c1ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858adc00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588578c r4:85885400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588578c r4:858d7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c1ec00 r8:858d76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7680 r8:8027ed34 r7:ece5de60 r6:858d7700 r5:84c1ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece61fb0 to 0xece61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ad740 INFO: task kworker/0:503:6417 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d6ffc000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858adf40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85850000 r7:00000000 r6:83018000 r5:00001000 r4:7f1fd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85885f8c r4:85885c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85885f8c r4:858d7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850000 r8:858d77ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7780 r8:8027ed34 r7:ece61e60 r6:858d7800 r5:85850000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece69fb0 to 0xece69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ad740 INFO: task kworker/0:504:6418 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d71bf000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85885b8c r4:85885800 r10:61c88647 r9:85850c00 r8:858d78ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cc0c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85851800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbe7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588638c r4:85886000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588638c r4:858d7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85851800 r8:858d79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7980 r8:8027ed34 r7:ece69e60 r6:858d7a00 r5:85851800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece71fb0 to 0xece71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc000 INFO: task kworker/0:506:6424 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d7616000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:6425 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:6425 tgid:6425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece75d84 r8:00000002 r7:60000013 r6:ece75d8c r5:85852400 r4:85852400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85852400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cc380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85852400 r7:00000000 r6:83018000 r5:00001000 r4:7f201000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccbd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588678c r4:85886400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588678c r4:858d7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85852400 r8:858d7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7a80 r8:8027ed34 r7:ece71e60 r6:858d7b00 r5:85852400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece75fb0 to 0xece75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc000 INFO: task kworker/0:507:6425 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d7e35000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:6427 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:6427 tgid:6427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece79d84 r8:00000002 r7:60000013 r6:ece79d8c r5:85853000 r4:85853000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85853000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cc4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85853000 r7:00000000 r6:83018000 r5:00001000 r4:7f203000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85886b8c r4:85886800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85886b8c r4:858d7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85853000 r8:858d7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7b80 r8:8027ed34 r7:ece75e60 r6:858d7c00 r5:85853000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece79fb0 to 0xece79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc200 INFO: task kworker/0:508:6427 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d7e35000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:6429 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:6429 tgid:6429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece7dd84 r8:00000002 r7:60000013 r6:ece7dd8c r5:85853c00 r4:85853c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85853c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cc640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f205000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85886f8c r4:85886c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85886f8c r4:858d7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85853c00 r8:858d7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7c80 r8:8027ed34 r7:ece79e60 r6:858d7d00 r5:85853c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece7dfb0 to 0xece7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc340 INFO: task kworker/0:509:6429 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d7f46000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:6431 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:6431 tgid:6431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece81d84 r8:00000002 r7:60000113 r6:ece81d8c r5:85854800 r4:85854800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85854800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cc7c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85854800 r7:00000000 r6:83018000 r5:00001000 r4:7f207000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588738c r4:85887000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588738c r4:858d7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85854800 r8:858d7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7d80 r8:8027ed34 r7:ece7de60 r6:858d7e00 r5:85854800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc440 INFO: task kworker/0:510:6431 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d82e8000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:6433 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:6433 tgid:6433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece85d84 r8:00000002 r7:60000013 r6:ece85d8c r5:85855400 r4:85855400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85855400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ccac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85855400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85887b8c r4:85887800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85887b8c r4:858d7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85855400 r8:858d7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7e80 r8:8027ed34 r7:ece81e60 r6:858d7f00 r5:85855400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece85fb0 to 0xece85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc5c0 INFO: task kworker/0:511:6433 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d82e8000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:6436 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:6436 tgid:6436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece89d84 r8:00000002 r7:60000113 r6:ece89d8c r5:85856000 r4:85856000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85856000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cc980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85856000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588778c r4:85887400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588778c r4:858d7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85856000 r8:858d7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:858d7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858d7f80 r8:8027ed34 r7:ece85e60 r6:85954000 r5:85856000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece89fb0 to 0xece89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc800 INFO: task kworker/0:512:6436 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d86d9000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:6437 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:6437 tgid:6437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec7f1d84 r8:00000002 r7:60000013 r6:ec7f1d8c r5:85856c00 r4:85856c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85856c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ccf40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85856c00 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589478c r4:85894400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589478c r4:85954080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85856c00 r8:859540ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954080 r8:8027ed34 r7:ece85e60 r6:85954100 r5:85856c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f1fb0 to 0xec7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858cc940 INFO: task kworker/0:513:6437 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d88da000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:6439 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:6439 tgid:6439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece8dd84 r8:00000002 r7:60000113 r6:ece8dd8c r5:85858000 r4:85858000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85858000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cccc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85858000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd09000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85887f8c r4:85887c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85887f8c r4:85954180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85858000 r8:859541ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954180 r8:8027ed34 r7:ec7f1e60 r6:85954200 r5:85858000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece8dfb0 to 0xece8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ccb40 INFO: task kworker/0:514:6439 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d88da000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:6442 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:6442 tgid:6442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece91d84 r8:00000002 r7:60000013 r6:ece91d8c r5:85858c00 r4:85858c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85858c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858add40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85858c00 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe91000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85894f8c r4:85894c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85894f8c r4:85954300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85858c00 r8:8595432c r7:82804d40 r6:dddced40 r5:dddced60 r4:85954300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954300 r8:8027ed34 r7:ec7f1e60 r6:85954380 r5:85858c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece91fb0 to 0xece91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26900 INFO: task kworker/0:515:6442 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d88da000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:6444 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:6444 tgid:6444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece95d84 r8:00000002 r7:60000013 r6:ece95d8c r5:85859800 r4:85859800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85859800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ccfc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85859800 r7:00000000 r6:83018000 r5:00001000 r4:7f219000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe6b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85894b8c r4:85894800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85894b8c r4:85954280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85859800 r8:859542ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954280 r8:8027ed34 r7:ece91e60 r6:85954400 r5:85859800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece95fb0 to 0xece95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858adf80 INFO: task kworker/0:516:6444 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d8c07000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:6446 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:6446 tgid:6446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece6dd84 r8:00000002 r7:60000113 r6:ece6dd8c r5:8585a400 r4:8585a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8585a400 r7:00000000 r6:83018000 r5:00001000 r4:7f21d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebef9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589538c r4:85895000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589538c r4:85954480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585a400 r8:859544ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954480 r8:8027ed34 r7:ece91e60 r6:85954500 r5:8585a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece6dfb0 to 0xece6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85964000 INFO: task kworker/0:517:6446 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d8c07000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:6448 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecea5d84 r8:00000002 r7:600f0013 r6:ecea5d8c r5:8530a400 r4:8530a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8530a400 r7:00000000 r6:83018000 r5:00001000 r4:7f21f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf55000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589578c r4:85895400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589578c r4:85954580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530a400 r8:859545ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954580 r8:8027ed34 r7:ece6de60 r6:85959d80 r5:8530a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea5fb0 to 0xecea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85964040 INFO: task kworker/0:518:6448 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d9438000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:6450 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:6450 tgid:6450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eceadd84 r8:00000002 r7:60000113 r6:eceadd8c r5:85308c00 r4:85308c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85308c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f225000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85895f8c r4:85895c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85895f8c r4:85954600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308c00 r8:8595462c r7:82804d40 r6:dddced40 r5:dddced60 r4:85954600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954600 r8:8027ed34 r7:ecea5e60 r6:85959e00 r5:85308c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceadfb0 to 0xeceadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859641c0 INFO: task kworker/0:519:6450 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d9438000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:6451 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecea9d84 r8:00000002 r7:60000113 r6:ecea9d8c r5:8530c800 r4:8530c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8530c800 r7:00000000 r6:83018000 r5:00001000 r4:7f223000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85895b8c r4:85895800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85895b8c r4:85954680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530c800 r8:859546ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954680 r8:8027ed34 r7:eceade60 r6:85959e80 r5:8530c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859641c0 INFO: task kworker/0:520:6451 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d960d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:6455 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:6455 tgid:6455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eceb9d84 r8:00000002 r7:60000113 r6:eceb9d8c r5:8530d400 r4:8530d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8530d400 r7:00000000 r6:83018000 r5:00001000 r4:7f231000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589778c r4:85897400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589778c r4:85954700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530d400 r8:8595472c r7:82804d40 r6:dddced40 r5:dddced60 r4:85954700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954700 r8:8027ed34 r7:eceade60 r6:85959f00 r5:8530d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb9fb0 to 0xeceb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85964440 INFO: task kworker/0:521:6455 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d960d000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:6456 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:6456 tgid:6456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecebdd84 r8:00000002 r7:60000113 r6:ecebdd8c r5:8530ec00 r4:8530ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecebde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859647c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8530ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f227000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec811000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589638c r4:85896000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589638c r4:85954780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530ec00 r8:859547ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954780 r8:8027ed34 r7:eceb9e60 r6:85959f80 r5:8530ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecebdfb0 to 0xecebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85964440 INFO: task kworker/0:522:6456 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d9865000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:6458 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:6458 tgid:6458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecec5d84 r8:00000002 r7:60000013 r6:ecec5d8c r5:8530e000 r4:8530e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:523:6458 is blocked on a mutex likely owned by task kworker/1:336:3934. r5:80070013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:524 state:D stack:0 pid:6460 tgid:6460 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85309800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ececde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85309800 r7:00000000 r6:83018000 r5:00001000 r4:7f22b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec86b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85896b8c r4:85896800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85896b8c r4:85954880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85309800 r8:859548ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954880 r8:8027ed34 r7:eceb9e60 r6:85973080 r5:85309800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xececdfb0 to 0xececdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859646c0 INFO: task kworker/0:524:6460 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d9d62000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:6462 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:6462 tgid:6462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eced5d84 r8:00000002 r7:60000113 r6:eced5d8c r5:8530b000 r4:8530b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8530b000 r7:00000000 r6:83018000 r5:00001000 r4:7f22d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec885000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85896f8c r4:85896c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85896f8c r4:85954900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530b000 r8:8595492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85954900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954900 r8:8027ed34 r7:eceb9e60 r6:85973100 r5:8530b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced5fb0 to 0xeced5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:526 state:D stack:0 pid:6464 tgid:6464 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8589738c r4:85897000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85964940 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) 9d20: d9fa5000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:6466 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:6466 tgid:6466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecee5d84 r8:00000002 r7:60000113 r6:ecee5d8c r5:85941800 r4:85941800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85941800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85964f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85941800 r7:00000000 r6:83018000 r5:00001000 r4:7f233000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85897b8c r4:85897800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85897b8c r4:85954a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85941800 r8:85954a2c r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0839d20 to 0xe0839d68) r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 Not tainted 6.16.0-rc1-syzkaller #0 r4:85940c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85964ec0 INFO: task kworker/0:528:6468 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: da72b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:6470 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:6470 tgid:6470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecef5d84 r8:00000002 r7:60000013 r6:ecef5d8c r5:85942400 r4:85942400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85942400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85942400 r8:85954b2c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: da72b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:530 state:D stack:0 pid:6474 tgid:6474 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589878c r4:85898400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589878c r4:85954b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85943c00 r8:85954bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954b80 r8:8027ed34 r7:eceede60 r6:85973380 r5:85943c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece99fb0 to 0xece99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8597a180 INFO: task kworker/0:530:6474 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dab92000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:6476 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecef9d84 r8:00000002 r7:60000013 r6:ecef9d8c r5:85944800 r4:85944800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85944800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597a5c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85944800 r7:00000000 r6:83018000 r5:00001000 r4:7f23d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc19000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85898f8c r4:85898c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85898f8c r4:85954c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85944800 r8:85954c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85954c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954c00 r8:8027ed34 r7:eceede60 r6:85973400 r5:85944800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8597a0c0 Call trace: Exception stack(0xe0839d20 to 0xe0839d68) r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) INFO: task kworker/0:532:6478 blocked for more than 475 seconds. r4:85945400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:6480 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:6480 tgid:6480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecf01d84 r8:00000002 r7:60000113 r6:ecf01d8c r5:85946000 r4:85946000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85946000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597a800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85946000 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc37000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589978c r4:85899400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589978c r4:85954d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85946000 r8:85954d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85954d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: db380000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84d28640 task:kworker/0:534 state:D stack:0 pid:6484 tgid:6484 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85899b8c r4:85899800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85899b8c r4:85954d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85946c00 r8:85954dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85954d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954d80 r8:8027ed34 r7:ecf01e60 r6:85973580 r5:85946c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf11fb0 to 0xecf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8597a500 INFO: task kworker/0:534:6484 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: db380000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:6485 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecef1d84 r8:00000002 r7:60000113 r6:ecef1d8c r5:8585bc00 r4:8585bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85899f8c r4:85899c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85899f8c r4:85954e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585bc00 r8:85954e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85954e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85954e00 r8:8027ed34 r7:ecf11e60 r6:85954e80 r5:8585bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef1fb0 to 0xecef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8597aa80 INFO: task kworker/0:535:6485 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d60: 80070013 ffffffff r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ece9dd84 r8:00000002 r7:60000013 r6:ece9dd8c r5:8585d400 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:6489 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:6489 tgid:6489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecf09d84 r8:00000002 r7:60000013 r6:ecf09d8c r5:8585e000 r4:8585e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597af00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8585e000 r7:00000000 r6:83018000 r5:00001000 r4:7f24b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccb5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ab8c r4:8589a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589ab8c r4:8597e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585e000 r8:8597e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597e000 r8:8027ed34 r7:ece9de60 r6:8597e080 r5:8585e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf09fb0 to 0xecf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8597a940 INFO: task kworker/0:537:6489 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d20: db7a4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:e0839dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:850ec38c r4:850ec000 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 Not tainted 6.16.0-rc1-syzkaller #0 r4:8585ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf15e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8585ec00 r8:8597e12c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:539 state:D stack:0 pid:6493 tgid:6493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597ad80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8585c800 r7:00000000 r6:83018000 r5:00001000 r4:7f24f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd81000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589b38c r4:8589b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589b38c r4:8597e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585c800 r8:8597e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597e200 r8:8027ed34 r7:ecf09e60 r6:8597e280 r5:8585c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf19fb0 to 0xecf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8597ad80 INFO: task kworker/0:539:6493 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dbd58000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:6495 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/0:540 state:D stack:0 pid:6495 tgid:6495 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: dc06b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:6496 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:6496 tgid:6496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecf25d84 r8:00000002 r7:60000113 r6:ecf25d8c r5:85310000 r4:85310000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85310000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85988140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85310000 r7:00000000 r6:83018000 r5:00001000 r4:7f251000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecda9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589b78c r4:8589b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589b78c r4:8597e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85310000 r8:8597e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597e400 r8:8027ed34 r7:ecf19e60 r6:8597e480 r5:85310000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85988080 INFO: task kworker/0:541:6496 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dc1b4000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:542:6499 blocked for more than 475 seconds. r4:85310c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf2de08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85310c00 r8:8597e52c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85988240 INFO: task kworker/0:542:6499 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dc58f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:543 state:D stack:0 pid:6500 tgid:6500 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589bf8c r4:8589bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589bf8c r4:8597e600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85311800 r8:8597e62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597e600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597e600 r8:8027ed34 r7:ecf2de60 r6:8597e680 r5:85311800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf39fb0 to 0xecf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85988180 INFO: task kworker/0:543:6500 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dc58f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0839dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:850ec38c r4:850ec000 r4:84345c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:544 state:D stack:0 pid:6502 tgid:6502 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf45e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85313000 r8:8597e72c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:e0839dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:6504 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:6504 tgid:6504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecf51d84 r8:00000002 r7:60000013 r6:ecf51d8c r5:85314800 r4:85314800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85314800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85988780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85314800 r7:00000000 r6:83018000 r5:00001000 r4:7f257000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf41000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1038c r4:85a10000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1038c r4:8597e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85314800 r8:8597e82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597e800 r8:8027ed34 r7:ecf45e60 r6:8597e880 r5:85314800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf51fb0 to 0xecf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85988600 INFO: task kworker/0:545:6504 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 Exception stack(0xe0839d20 to 0xe0839d68) 9d60: 80070013 ffffffff r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ecf5dd84 r8:00000002 r7:60000013 r6:ecf5dd8c r5:85315400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85988c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: dcc5b000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 Exception stack(0xe0839fb0 to 0xe0839ff8) r4:84d28640 task:kworker/0:547 state:D stack:0 pid:6508 tgid:6508 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85988d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85316c00 r7:00000000 r6:83018000 r5:00001000 r4:7f25d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf65000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a10f8c r4:85a10c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a10f8c r4:8597ea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316c00 r8:8597ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597ea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597ea00 r8:8027ed34 r7:ecf5de60 r6:8597ea80 r5:85316c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf1dfb0 to 0xecf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85988a80 INFO: task kworker/0:547:6508 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dcebc000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:6510 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:6510 tgid:6510 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85312400 r4:82918640 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dd0e6000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:6513 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:6513 tgid:6513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecf95d84 r8:00000002 r7:60000013 r6:ecf95d8c r5:85999800 r4:85999800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85999800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597aec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85999800 r7:00000000 r6:83018000 r5:00001000 r4:7f261000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1138c r4:85a11000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:550:6515 blocked for more than 476 seconds. r10:82918644 r9:ecf99d84 r8:00000002 r7:60000113 r6:ecf99d8c r5:8599a400 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:8599a400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1278c r4:85a12400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1278c r4:8597ed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8599a400 r8:8597ed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597ed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597ed00 r8:8027ed34 r7:ecf75e60 r6:8597ed80 r5:8599a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf99fb0 to 0xecf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598a100 INFO: task kworker/0:550:6515 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dd285000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:6517 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:6517 tgid:6517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ecfa5d84 r8:00000002 r7:60000013 r6:ecfa5d8c r5:85998c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfa5e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: dd838000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:552 state:D stack:0 pid:6518 tgid:6518 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:8599bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f267000 r5:85a11f8c r4:85a11c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a11f8c r4:8597ef00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8599bc00 r8:8597ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8597ef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8597ef00 r8:8027ed34 r7:ecf99e60 r6:8597ef80 r5:8599bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb1fb0 to 0xecfb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598a600 INFO: task kworker/0:552:6518 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: dd838000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:6521 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecfb5d84 r8:00000002 r7:60000013 r6:ecfb5d8c r5:8599c800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfcf1000 r5:85a1238c r4:85a12000 r10:61c88647 r9:8599c800 r8:8598902c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:8599d400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:8599d400 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb63f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a12b8c r4:85a12800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a12b8c r4:85989100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8599d400 r8:8598912c r7:82804d40 r6:dddced40 r5:dddced60 r4:85989100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85989100 r8:8027ed34 r7:ecf99e60 r6:85989180 r5:8599d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf81fb0 to 0xecf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598a980 INFO: task kworker/0:554:6523 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: ddc91000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:6525 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:6525 tgid:6525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecf71d84 r8:00000002 r7:60000013 r6:ecf71d8c r5:8530bc00 r4:8530bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf71e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598ae40 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0839d20 to 0xe0839d68) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:6526 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8593b000 r8:859892ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: de216000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:6530 blocked for more than 476 seconds. task:kworker/0:557 state:D stack:0 pid:6530 tgid:6530 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85948000 r8:8598932c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0839d20 to 0xe0839d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:558:6532 blocked for more than 476 seconds. r10:82918644 r9:ecfcdd84 r8:00000002 r7:60000113 r6:ecfcdd8c r5:85949800 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfcdfb0 to 0xecfcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26b80 INFO: task kworker/0:558:6532 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: de517000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:6534 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:6534 tgid:6534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecfc1d84 r8:00000002 r7:60000013 r6:ecfc1d8c r5:8599b000 r4:8599b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8599b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f26940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8599b000 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8599b000 r8:8598942c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: de59f000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:6535 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:6535 tgid:6535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecfb9d84 r8:00000002 r7:60000113 r6:ecfb9d8c r5:8599e000 r4:8599e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8599e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598c680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8599e000 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a18b8c r4:85a18800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a18b8c r4:85989500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecfd5d84 r8:00000002 r7:60000013 r6:ecfd5d8c r5:8599ec00 r4:8599ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8599ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598c380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8599ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebed9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1838c r4:85a18000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1838c r4:85989600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8599ec00 r8:8598962c r7:82804d40 r6:dddced40 r5:dddced60 r4:85989600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85989600 r8:8027ed34 r7:ecfb9e60 r6:85989680 r5:8599ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfd5fb0 to 0xecfd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598c200 INFO: task kworker/0:561:6538 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: deb87000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 task:kworker/0:562 state:D stack:0 pid:6540 tgid:6540 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ebf6f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecfd9fb0 to 0xecfd9ff8) r4:8598c440 Workqueue: events bpf_prog_free_deferred 9d20: ded51000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:6542 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:6542 tgid:6542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecfd1d84 r8:00000002 r7:60000113 r6:ecfd1d8c r5:85316000 r4:85316000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85316000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598c8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85316000 r7:00000000 r6:83018000 r5:00001000 r4:7f183000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a18f8c r4:85a18c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a18f8c r4:85989800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316000 r8:8598982c r7:82804d40 r6:dddced40 r5:dddced60 r4:85989800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85989800 r8:8027ed34 r7:ecfb9e60 r6:85989880 r5:85316000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfd1fb0 to 0xecfd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598c440 INFO: task kworker/0:563:6542 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 9d20: ded51000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 r4:e0839dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:564:6545 blocked for more than 476 seconds. r10:82918644 r9:ecfddd84 r8:00000002 r7:60000113 r6:ecfddd8c r5:85313c00 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1938c r4:85a19000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1938c r4:85989900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85313c00 r8:8598992c r7:82804d40 r6:dddced40 r5:dddced60 r4:85989900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85989900 r8:8027ed34 r7:ecfd1e60 r6:85989980 r5:85313c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfddfb0 to 0xecfddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598c740 INFO: task kworker/0:564:6545 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: df215000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ecfe1d84 r8:00000002 r7:60000013 r6:ecfe1d8c r5:859a0000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0839d20 to 0xe0839d68) r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:6548 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:6548 tgid:6548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecfe5d84 r8:00000002 r7:60000013 r6:ecfe5d8c r5:859a0c00 r4:859a0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859a0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfe5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598cb40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca5d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1978c r4:85a19400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1978c r4:85989b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859a0c00 r8:85989b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85989b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85989b00 r8:8027ed34 r7:ecfe1e60 r6:85989b80 r5:859a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0839d20 to 0xe0839d68) r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:dfedb000 r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 INFO: task kworker/0:567:6551 blocked for more than 476 seconds. Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eca95000 r5:85a19f8c r4:85a19c00 r10:61c88647 r9:859a1800 r8:85989c2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8598cb00 INFO: task kworker/0:567:6551 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506c800 r8:80200be4 r7:e0839d54 r6:ffffffff r5:8506c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0839d20 to 0xe0839d68) 9d20: df933000 dfeb9000 00000001 80239bb8 7f033000 00000001 82ac11c4 82ac05a0 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 9d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:6553 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:6553 tgid:6553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecff1d84 r8:00000002 r7:60000113 r6:ecff1d8c r5:859a2400 r4:859a2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859a2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598cf40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f19b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1a38c r4:85a1a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1a38c r4:85989d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859a2400 r8:85989d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85989d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85989d00 r8:8027ed34 r7:ecfede60 r6:85989d80 r5:859a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecff1fb0 to 0xecff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598cc00 INFO: task kworker/0:568:6553 is blocked on a mutex likely owned by task kworker/1:336:3934. task:kworker/1:336 state:R running task stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850ec38c r4:850ec000 r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:84d28640 task:kworker/0:569 state:D stack:0 pid:6554 tgid:6554 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859a3000 r4:82918640 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecad1000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:859a3000 r8:85989e2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 7f033000 dfeb9000 8280c9b4 e0839d9c e0839da0 e0839d70 80230af4 80239bd0 r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0839dc0 r5:e0839e08 r4:e0839dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84345c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506c800 r8:84345cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345c80 r8:8027ed34 r7:e0841e60 r6:84345d00 r5:8506c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d28640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:6556 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:6556 tgid:6556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecff5d84 r8:00000002 r7:60000113 r6:ecff5d8c r5:859a3c00 r4:859a3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859a3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859db140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1ab8c r4:85a1a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1ab8c r4:85989f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859a3c00 r8:85989f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85989f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85989f00 r8:8027ed34 r7:ecfe9e60 r6:85989f80 r5:859a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecff5fb0 to 0xecff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8598cfc0 INFO: task kworker/0:570:6556 is blocked on a mutex, but the owner is not found. Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:6559 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:6559 tgid:6559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecff9d84 r8:00000002 r7:60000113 r6:ecff9d8c r5:859a4800 r4:859a4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859a4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859db280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f1a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1af8c r4:85a1ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1af8c r4:859e0000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859a4800 r8:859e002c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0000 r8:8027ed34 r7:ecff5e60 r6:859e0080 r5:859a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecff9fb0 to 0xecff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859db1c0 INFO: task kworker/0:571:6559 is blocked on a mutex, but the owner is not found. Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:6560 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:6560 tgid:6560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecffdd84 r8:00000002 r7:60000013 r6:ecffdd8c r5:859a5400 r4:859a5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859a5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecffde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859db480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1b38c r4:85a1b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1b38c r4:859e0100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859a5400 r8:859e012c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0100 r8:8027ed34 r7:ecff9e60 r6:859e0180 r5:859a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecffdfb0 to 0xecffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859db100 INFO: task kworker/0:572:6560 is blocked on a mutex, but the owner is not found. Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed001e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:859a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a7000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1b78c r4:85a1b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1b78c r4:859e0200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859a6000 r8:859e022c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0200 r8:8027ed34 r7:ecffde60 r6:859e0280 r5:859a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed001fb0 to 0xed001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859db300 INFO: task kworker/0:573:6562 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 7f6f7000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:574 state:D stack:0 pid:6563 tgid:6563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed009d84 r8:00000002 r7:60000013 r6:ed009d8c r5:85318000 r4:85318000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85318000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed009e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859db880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85318000 r7:00000000 r6:83018000 r5:00001000 r4:7f1f1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbb7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1bb8c r4:85a1b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1bb8c r4:859e0300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85318000 r8:859e032c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0300 r8:8027ed34 r7:ed001e60 r6:859e0380 r5:85318000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed009fb0 to 0xed009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859db440 INFO: task kworker/0:574:6563 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 7f6f7000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r5:00001000 r4:dff1d000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:575 state:D stack:0 pid:6566 tgid:6566 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85319800 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed00de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:ecd03000 r5:85a24b8c r4:85a24800 r10:61c88647 r9:85319800 r8:859e042c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:859e0400 r8:8027ed34 r7:ed009e60 r6:859e0480 r5:85319800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed00dfb0 to 0xed00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859db700 INFO: task kworker/0:575:6566 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 7f95a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:6568 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:6568 tgid:6568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed011d84 r8:00000002 r7:60000013 r6:ed011d8c r5:85318c00 r5:85318c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed011e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a1bf8c r4:85a1bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dff1d000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:6570 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:6570 tgid:6570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed015d84 r8:00000002 r7:60000013 r6:ed015d8c r5:8531a400 r4:8531a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8531a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed015e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859dbc80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8531a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2438c r4:85a24000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2438c r4:859e0600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531a400 r8:859e062c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0600 r8:8027ed34 r7:ed00de60 r6:859e0680 r5:8531a400 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859db7c0 INFO: task kworker/0:577:6570 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 80024000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 INFO: task kworker/0:578:6572 blocked for more than 476 seconds. r10:82918644 r9:ed019d84 r8:00000002 r7:60000113 r6:ed019d8c r5:8531c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed019e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed019fb0 to 0xed019ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84345d80 Exception stack(0xe0851fb0 to 0xe0851ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ed01dd84 r8:00000002 r7:60000013 r6:ed01dd8c r5:8531d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed01de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e83c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8531d400 r7:00000000 r6:83018000 r5:00001000 r4:7f201000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd97000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2538c r4:85a25000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2538c r4:859e0800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531d400 r8:859e082c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0800 r8:8027ed34 r7:ed00de60 r6:859e0880 r5:8531d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed01dfb0 to 0xed01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859dbf00 INFO: task kworker/0:579:6574 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 80469000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Call trace: r5:8531bc00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed021e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:ecd13000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed021fb0 to 0xed021ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:6578 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:6578 tgid:6578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed005d84 r8:00000002 r7:60000113 r6:ed005d8c r5:8531e000 r4:8531e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8531e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed005e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8531e000 r7:00000000 r6:83018000 r5:00001000 r4:7f203000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed029000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2578c r4:85a25400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2578c r4:859e0a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531e000 r8:859e0a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0a00 r8:8027ed34 r7:ed01de60 r6:859e0a80 r5:8531e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed005fb0 to 0xed005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e81c0 INFO: task kworker/0:581:6578 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 80469000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:6581 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:6581 tgid:6581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed02dd84 r8:00000002 r7:60000113 r6:ed02dd8c r5:8531ec00 r4:8531ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8531ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed02de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8531ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f205000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a25b8c r4:85a25800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a25b8c r4:859e0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531ec00 r8:859e0b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0b00 r8:8027ed34 r7:ed005e60 r6:859e0b80 r5:8531ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed02dfb0 to 0xed02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e8480 INFO: task kworker/0:582:6581 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 807f8000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r5:80070113 r4:80239bd0 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:6582 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:6582 tgid:6582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed025d84 r8:00000002 r7:60000013 r6:ed025d8c r5:8531b000 r4:8531b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8531b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8531b000 r7:00000000 r6:83018000 r5:00001000 r4:7f26b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed04d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2638c r4:85a26000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2638c r4:859e0c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531b000 r8:859e0c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0c00 r8:8027ed34 r7:ed02de60 r6:859e0c80 r5:8531b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed025fb0 to 0xed025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e8480 INFO: task kworker/0:583:6582 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 807f8000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0851fb0 to 0xe0851ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:584:6583 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ed055d84 r8:00000002 r7:60000113 r6:ed055d8c r5:859a6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e87c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f269000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed041000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a25f8c r4:85a25c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a25f8c r4:859e0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859a6c00 r8:859e0d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0d00 r8:8027ed34 r7:ed025e60 r6:859e0d80 r5:859a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed055fb0 to 0xed055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e8480 INFO: task kworker/0:584:6583 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 80b0a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:6586 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:6586 tgid:6586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed045d84 r8:00000002 r7:60000113 r6:ed045d8c r5:859b8000 r4:859b8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed045e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f271000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed071000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26f8c r4:85a26c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a26f8c r4:859e0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b8000 r8:859e0e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859e0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e0e00 r8:8027ed34 r7:ed025e60 r6:859e0e80 r5:859b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed045fb0 to 0xed045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e8900 INFO: task kworker/0:585:6586 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 80b0a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:6588 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:6588 tgid:6588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed051d84 r8:00000002 r7:60000113 r6:ed051d8c r5:859b9800 r4:859b9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed051e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f26d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed05d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:859e0f00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r5:80070113 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/0:587 state:D stack:0 pid:6590 tgid:6590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed061d84 r8:00000002 r7:60000013 r6:ed061d8c r5:859ba400 r4:859ba400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859ba400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f26f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed069000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26b8c r4:85a26800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a26b8c r4:859ef000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ba400 r8:859ef02c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef000 r8:8027ed34 r7:ed045e60 r6:859ef080 r5:859ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed061fb0 to 0xed061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e8d00 INFO: task kworker/0:587:6590 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 80e4e000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:6592 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:6592 tgid:6592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed075d84 r8:00000002 r7:60000113 r6:ed075d8c r5:859bb000 r4:859bb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed075e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e8900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f273000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed07d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2738c r4:85a27000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2738c r4:859ef180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bb000 r8:859ef1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef180 r8:8027ed34 r7:ed045e60 r6:859ef200 r5:859bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed075fb0 to 0xed075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859db7c0 INFO: task kworker/0:588:6592 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 810ec000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:6594 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:6594 tgid:6594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed081d84 r8:00000002 r7:60000113 r6:ed081d8c r5:859bbc00 r4:859bbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed081e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f279000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a27f8c r4:85a27c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a27f8c r4:859ef100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bbc00 r8:859ef12c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef100 r8:8027ed34 r7:ed075e60 r6:859ef280 r5:859bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed081fb0 to 0xed081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859e8ec0 INFO: task kworker/0:589:6594 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 81460000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:6595 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:6595 tgid:6595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed099d84 r8:00000002 r7:60000113 r6:ed099d8c r5:859bc800 r4:859bc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed099e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f275000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed089000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2778c r4:85a27400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2778c r4:859ef300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bc800 r8:859ef32c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef300 r8:8027ed34 r7:ed081e60 r6:859ef380 r5:859bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed099fb0 to 0xed099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8080 INFO: task kworker/0:590:6595 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8176b000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:6598 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:6598 tgid:6598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0b1d84 r8:00000002 r7:60000113 r6:ed0b1d8c r5:8594bc00 r4:8594bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8594bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f277000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed095000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a27b8c r4:85a27800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a27b8c r4:859ef400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594bc00 r8:859ef42c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef400 r8:8027ed34 r7:ed081e60 r6:85973800 r5:8594bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0b1fb0 to 0xed0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8480 INFO: task kworker/0:591:6598 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8176b000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:6600 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:6600 tgid:6600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0c5d84 r8:00000002 r7:60000013 r6:ed0c5d8c r5:85948c00 r4:85948c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85948c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85948c00 r7:00000000 r6:83018000 r5:00001000 r4:7f27d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3078c r4:85a30400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3078c r4:859ef500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85948c00 r8:859ef52c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef500 r8:8027ed34 r7:ed081e60 r6:85973880 r5:85948c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c5fb0 to 0xed0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8280 INFO: task kworker/0:592:6600 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 81ba7000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:6601 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:6601 tgid:6601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0c9d84 r8:00000002 r7:60000113 r6:ed0c9d8c r5:8594e000 r4:8594e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8594e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f85c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594e000 r7:00000000 r6:83018000 r5:00001000 r4:7f27b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3038c r4:85a30000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3038c r4:859ef480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594e000 r8:859ef4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef480 r8:8027ed34 r7:ed0c5e60 r6:85973900 r5:8594e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c9fb0 to 0xed0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8280 INFO: task kworker/0:593:6601 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 81ba7000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:6603 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:6603 tgid:6603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0d9d84 r8:00000002 r7:60000113 r6:ed0d9d8c r5:8594c800 r4:8594c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8594c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f88c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594c800 r7:00000000 r6:83018000 r5:00001000 r4:7f27f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a30b8c r4:85a30800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a30b8c r4:859ef580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594c800 r8:859ef5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef580 r8:8027ed34 r7:ed0c5e60 r6:85973980 r5:8594c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d9fb0 to 0xed0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8300 INFO: task kworker/0:594:6603 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 81f19000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:6606 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:6606 tgid:6606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eceb1d84 r8:00000002 r7:60000113 r6:eceb1d8c r5:8594ec00 r4:8594ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8594ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8a00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a30f8c r4:85a30c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a30f8c r4:859ef600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594ec00 r8:859ef62c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef600 r8:8027ed34 r7:ed0d9e60 r6:85973a00 r5:8594ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb1fb0 to 0xeceb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8740 INFO: task kworker/0:595:6606 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 822b0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:6609 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:6609 tgid:6609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0f5d84 r8:00000002 r7:60000113 r6:ed0f5d8c r5:85943000 r4:85943000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85943000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8e00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85943000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdfd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a31b8c r4:85a31800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a31b8c r4:859ef680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85943000 r8:859ef6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef680 r8:8027ed34 r7:eceb1e60 r6:85973a80 r5:85943000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8880 INFO: task kworker/0:596:6609 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 822b0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:6610 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:6610 tgid:6610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0f9d84 r8:00000002 r7:60000113 r6:ed0f9d8c r5:85a80000 r4:85a80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a80000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8b00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3138c r4:85a31000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3138c r4:859ef700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a80000 r8:859ef72c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef700 r8:8027ed34 r7:ed0f5e60 r6:85973b00 r5:85a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f9fb0 to 0xed0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8880 INFO: task kworker/0:597:6610 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 827e0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:6612 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:6612 tgid:6612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0fdd84 r8:00000002 r7:60000113 r6:ed0fdd8c r5:85a80c00 r4:85a80c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a80c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a80c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3178c r4:85a31400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3178c r4:859ef780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a80c00 r8:859ef7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef780 r8:8027ed34 r7:ed0f5e60 r6:85973b80 r5:85a80c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0fdfb0 to 0xed0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8bc0 INFO: task kworker/0:598:6612 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 827e0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:6614 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:6614 tgid:6614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed101d84 r8:00000002 r7:60000013 r6:ed101d8c r5:85a81800 r4:85a81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a81800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed101e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a81800 r7:00000000 r6:83018000 r5:00001000 r4:7f207000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe6d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a31f8c r4:85a31c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a31f8c r4:859ef800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a81800 r8:859ef82c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef800 r8:8027ed34 r7:ed0f5e60 r6:85973c00 r5:85a81800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed101fb0 to 0xed101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8c40 INFO: task kworker/0:599:6614 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 82b59000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:6616 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:6616 tgid:6616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed105d84 r8:00000002 r7:60000013 r6:ed105d8c r5:85a82400 r4:85a82400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a82400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed105e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a82400 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebec5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3238c r4:85a32000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3238c r4:859ef880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a82400 r8:859ef8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef880 r8:8027ed34 r7:ed101e60 r6:85973c80 r5:85a82400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed105fb0 to 0xed105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f8e40 INFO: task kworker/0:600:6616 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 82b59000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:6618 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:6618 tgid:6618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed109d84 r8:00000002 r7:60000013 r6:ed109d8c r5:85a83000 r4:85a83000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a83000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a83000 r7:00000000 r6:83018000 r5:00001000 r4:7f219000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf51000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3278c r4:85a32400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3278c r4:859ef900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a83000 r8:859ef92c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef900 r8:8027ed34 r7:ed105e60 r6:85973d00 r5:85a83000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed109fb0 to 0xed109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46140 INFO: task kworker/0:601:6618 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 833af000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:6620 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:6620 tgid:6620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed10dd84 r8:00000002 r7:60000113 r6:ed10dd8c r5:85a83c00 r4:85a83c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a83c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed10de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ab000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a32b8c r4:85a32800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a32b8c r4:859ef980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a83c00 r8:859ef9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ef980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ef980 r8:8027ed34 r7:ed109e60 r6:85973d80 r5:85a83c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed10dfb0 to 0xed10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46200 INFO: task kworker/0:602:6620 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 833af000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:6622 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:6622 tgid:6622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed111d84 r8:00000002 r7:60000113 r6:ed111d8c r5:85a84800 r4:85a84800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a84800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a466c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a84800 r7:00000000 r6:83018000 r5:00001000 r4:7f21f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3338c r4:85a33000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3338c r4:859efa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a84800 r8:859efa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859efa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859efa00 r8:8027ed34 r7:ed10de60 r6:85973e00 r5:85a84800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46280 INFO: task kworker/0:603:6622 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 834a5000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:6624 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:6624 tgid:6624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed119d84 r8:00000002 r7:60000013 r6:ed119d8c r5:85a86000 r4:85a86000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a86000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed119e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a465c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a86000 r7:00000000 r6:83018000 r5:00001000 r4:7f21d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7df000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a32f8c r4:85a32c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a32f8c r4:859efa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a86000 r8:859efaac r7:82804d40 r6:dddced40 r5:dddced60 r4:859efa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859efa80 r8:8027ed34 r7:ed111e60 r6:85973e80 r5:85a86000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed119fb0 to 0xed119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46440 INFO: task kworker/0:604:6624 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 834a5000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:6626 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:6626 tgid:6626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed11dd84 r8:00000002 r7:60000113 r6:ed11dd8c r5:85a86c00 r4:85a86c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a86c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed11de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f223000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3378c r4:85a33400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3378c r4:859efb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a86c00 r8:859efb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859efb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859efb00 r8:8027ed34 r7:ed111e60 r6:85973f00 r5:85a86c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed11dfb0 to 0xed11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46440 INFO: task kworker/0:605:6626 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 83ba5000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:6628 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:6628 tgid:6628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed121d84 r8:00000002 r7:60000013 r6:ed121d8c r5:85a85400 r4:85a85400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a85400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed121e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a85400 r7:00000000 r6:83018000 r5:00001000 r4:7f229000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3438c r4:85a34000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3438c r4:859efb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a85400 r8:859efbac r7:82804d40 r6:dddced40 r5:dddced60 r4:859efb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859efb80 r8:8027ed34 r7:ed11de60 r6:85973f80 r5:85a85400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed121fb0 to 0xed121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46700 INFO: task kworker/0:606:6628 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 83c93000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e0851dc0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:6629 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:6629 tgid:6629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed125d84 r8:00000002 r7:60000013 r6:ed125d8c r5:8594d400 r4:8594d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8594d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed125e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594d400 r7:00000000 r6:83018000 r5:00001000 r4:7f225000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec875000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a33b8c r4:85a33800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a33b8c r4:859efc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594d400 r8:859efc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859efc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859efc00 r8:8027ed34 r7:ed121e60 r6:85a4e000 r5:8594d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed125fb0 to 0xed125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46540 INFO: task kworker/0:607:6629 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 Exception stack(0xe0851d20 to 0xe0851d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0851fb0 to 0xe0851ff8) INFO: task kworker/0:608:6633 blocked for more than 477 seconds. r10:82918644 r9:ed129d84 r8:00000002 r7:60000013 r6:ed129d8c r5:8594a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed129e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:e0851dc0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:6636 tgid:6636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed135d84 r8:00000002 r7:60000013 r6:ed135d8c r5:85a89800 r4:85a89800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a89800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed135e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46ec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a89800 r7:00000000 r6:83018000 r5:00001000 r4:7f22d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a34b8c r4:85a34800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a34b8c r4:859efd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a89800 r8:859efd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859efd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859efd00 r8:8027ed34 r7:ed129e60 r6:85a4e100 r5:85a89800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed135fb0 to 0xed135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46c40 INFO: task kworker/0:609:6636 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 846a7000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:6637 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed115e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:859efd80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85a46f80 Call trace: Exception stack(0xe0851d20 to 0xe0851d68) r4:e0851dc0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:611:6639 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:611 state:D stack:0 pid:6639 tgid:6639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed12dd84 r8:00000002 r7:60000013 r6:ed12dd8c r5:859bec00 r4:859bec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed12de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f8ec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f231000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3538c r4:85a35000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3538c r4:859efe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bec00 r8:859efeac r7:82804d40 r6:dddced40 r5:dddced60 r4:859efe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859efe80 r8:8027ed34 r7:ed115e60 r6:859eff00 r5:859bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed12dfb0 to 0xed12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46e40 INFO: task kworker/0:611:6639 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 84b07000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:612:6640 blocked for more than 477 seconds. r10:82918644 r9:ed09dd84 r8:00000002 r7:60000013 r6:ed09dd8c r5:859be000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed09de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e7880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859be000 r7:00000000 r6:83018000 r5:00001000 r4:7f233000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc23000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3578c r4:85a35400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3578c r4:859eff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859be000 r8:859effac r7:82804d40 r6:dddced40 r5:dddced60 r4:859eff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859eff80 r8:8027ed34 r7:ed12de60 r6:85a49000 r5:859be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed09dfb0 to 0xed09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a46e40 INFO: task kworker/0:612:6640 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 84b07000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ed139d84 r8:00000002 r7:60000113 r6:ed139d8c r5:859b8c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed139e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56040 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:613:6643 is blocked on a mutex likely owned by task kworker/1:337:3938. r5:80070113 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:614:6646 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:6646 tgid:6646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed141d84 r8:00000002 r7:60000113 r6:ed141d8c r5:84c68000 r4:84c68000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c68000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed141e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c68000 r7:00000000 r6:83018000 r5:00001000 r4:7f239000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc55000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a35f8c r4:85a35c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a35f8c r4:85a49180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c68000 r8:85a491ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49180 r8:8027ed34 r7:ed139e60 r6:85a49200 r5:84c68000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed141fb0 to 0xed141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a56240 INFO: task kworker/0:614:6646 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 85040000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:6647 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:6647 tgid:6647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed145d84 r8:00000002 r7:60000013 r6:ed145d8c r5:84c68c00 r4:84c68c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed145e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0851d20 to 0xe0851d68) r4:e0851dc0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:6649 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:6649 tgid:6649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed149d84 r8:00000002 r7:60000113 r6:ed149d8c r5:84c69800 r4:84c69800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c69800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed149e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c69800 r7:00000000 r6:83018000 r5:00001000 r4:7f23d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3678c r4:85a36400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3678c r4:85a49380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c69800 r8:85a493ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49380 r8:8027ed34 r7:ed145e60 r6:85a49400 r5:84c69800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed149fb0 to 0xed149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a56380 INFO: task kworker/0:616:6649 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 Exception stack(0xe0851d20 to 0xe0851d68) r4:e0851dc0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed13de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6b000 r7:00000000 r6:83018000 r5:00001000 r4:7f23f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd65000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a36b8c r4:85a36800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a36b8c r4:85a49480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6b000 r8:85a494ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49480 r8:8027ed34 r7:ed149e60 r6:85a49500 r5:84c6b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed13dfb0 to 0xed13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a564c0 INFO: task kworker/0:617:6651 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 859cb000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:84c6c800 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed151e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a49580 r8:8027ed34 r7:ed13de60 r6:85a49600 r5:84c6c800 Exception stack(0xed151fb0 to 0xed151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a56700 INFO: task kworker/0:618:6653 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 859cb000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:6654 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:6654 tgid:6654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed155d84 r8:00000002 r7:60000013 r6:ed155d8c r5:84c6d400 r4:84c6d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c6d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed155e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f241000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd7f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a36f8c r4:85a36c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a36f8c r4:85a49680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6d400 r8:85a496ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49680 r8:8027ed34 r7:ed151e60 r6:85a49700 r5:84c6d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed155fb0 to 0xed155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a56700 INFO: task kworker/0:619:6654 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 861a0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:620:6659 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:620 state:D stack:0 pid:6659 tgid:6659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed14dd84 r8:00000002 r7:60000013 r6:ed14dd8c r5:84c6bc00 r4:84c6bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c6bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed14de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a56e40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f247000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3778c r4:85a37400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3778c r4:85a49780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6bc00 r8:85a497ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49780 r8:8027ed34 r7:ed151e60 r6:85a49800 r5:84c6bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed14dfb0 to 0xed14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a56c40 INFO: task kworker/0:620:6659 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 861a0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r5:80070113 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:6660 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:6660 tgid:6660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed15dd84 r8:00000002 r7:60000013 r6:ed15dd8c r5:84c6ec00 r4:84c6ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c6ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed15de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46e40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f249000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a37b8c r4:85a37800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a37b8c r4:85a49880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6ec00 r8:85a498ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49880 r8:8027ed34 r7:ed14de60 r6:85a49900 r5:84c6ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed15dfb0 to 0xed15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a56c40 INFO: task kworker/0:621:6660 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 861a0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:622:6663 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:622 state:D stack:0 pid:6663 tgid:6663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed165d84 r8:00000002 r7:60000013 r6:ed165d8c r5:859c0c00 r4:859c0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5b400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f24f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf31000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3c38c r4:85a3c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3c38c r4:85a49980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c0c00 r8:85a499ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49980 r8:8027ed34 r7:ed15de60 r6:85a49a00 r5:859c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed165fb0 to 0xed165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 1d60: 80070113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:623:6665 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:623 state:D stack:0 pid:6665 tgid:6665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed161d84 r8:00000002 r7:60000013 r6:ed161d8c r5:859c0000 r4:859c0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5b240 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f24d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf0b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a37f8c r4:85a37c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a37f8c r4:85a49a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c0000 r8:85a49aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49a80 r8:8027ed34 r7:ed165e60 r6:85a49b00 r5:859c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed161fb0 to 0xed161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5b140 INFO: task kworker/0:623:6665 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 86c4a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:6666 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:6666 tgid:6666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed159d84 r8:00000002 r7:60000013 r6:ed159d8c r5:85a88000 r4:85a88000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a88000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed159e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5b640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a88000 r7:00000000 r6:83018000 r5:00001000 r4:7f251000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf3f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3c78c r4:85a3c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3c78c r4:85a49b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a88000 r8:85a49bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49b80 r8:8027ed34 r7:ed165e60 r6:85a4e180 r5:85a88000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed159fb0 to 0xed159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5b300 INFO: task kworker/0:624:6666 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d60: 80070113 ffffffff r4:e0851dc0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:6670 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:625 state:D stack:0 pid:6670 tgid:6670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed175d84 r8:00000002 r7:60000013 r6:ed175d8c r5:85a8c800 r4:85a8c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a8c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5b700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f253000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf53000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3cb8c r4:85a3c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3cb8c r4:85a49c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8c800 r8:85a49c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49c00 r8:8027ed34 r7:ed159e60 r6:85a4e200 r5:85a8c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed175fb0 to 0xed175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5b4c0 INFO: task kworker/0:625:6670 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dff1d000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:6672 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:6672 tgid:6672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed17dd84 r8:00000002 r7:60000013 r6:ed17dd8c r5:85a8e000 r4:85a8e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a8e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed17de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5b880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f255000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3cf8c r4:85a3cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3cf8c r4:85a49c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8e000 r8:85a49cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a49c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a49c80 r8:8027ed34 r7:ed175e60 r6:85a4e280 r5:85a8e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed17dfb0 to 0xed17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5b580 INFO: task kworker/0:626:6672 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ed181d84 r8:00000002 r7:60000013 r6:ed181d8c r5:85a8b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed181e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecf83000 r10:61c88647 r9:85a8b000 r8:85a49d2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xed181fb0 to 0xed181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5b680 INFO: task kworker/0:627:6673 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 873f0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:628:6674 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:628 state:D stack:0 pid:6674 tgid:6674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed169d84 r8:00000002 r7:60000013 r6:ed169d8c r5:859c1800 r4:859c1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed169e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5b9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f257000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3d38c r4:85a3d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3d38c r4:85a49d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:85a5b680 Workqueue: events bpf_prog_free_deferred 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:6677 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:6677 tgid:6677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed179d84 r8:00000002 r7:60000013 r6:ed179d8c r5:859c3000 r4:859c3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed179e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5be40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f25d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85a49e80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dff1d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:630 state:D stack:0 pid:6678 tgid:6678 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed16de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:859c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f25b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:6682 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:6682 tgid:6682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed18dd84 r8:00000002 r7:60000113 r6:ed18dd8c r5:859c4800 r4:859c4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed18de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a68140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f265000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1a5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3eb8c r4:85a3e800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3eb8c r4:85a62080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c4800 r8:85a620ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62080 r8:8027ed34 r7:ed179e60 r6:85a62100 r5:859c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed18dfb0 to 0xed18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5bf80 INFO: task kworker/0:631:6682 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8806a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r5:00001000 r4:dff1d000 r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed191e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5bf40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f261000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3e38c r4:85a3e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3e38c r4:85a62180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c5400 r8:85a621ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62180 r8:8027ed34 r7:ed18de60 r6:85a62200 r5:859c5400 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 88376000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dff1d000 r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:859c6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5b380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f263000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed199000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3e78c r4:85a3e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3e78c r4:85a62280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c6000 r8:85a622ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a9fb0 to 0xed1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r4:00000000 r5:850ec78c r4:850ec400 r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:634:6686 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:634 state:D stack:0 pid:6686 tgid:6686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed189d84 r8:00000002 r7:60000113 r6:ed189d8c r5:859c6c00 r4:859c6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed189e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a68380 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:859c6c00 r8:85a623ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 888cb000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a684c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85a62480 r8:8027ed34 r7:ed189e60 r6:85a62500 r5:859c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b5fb0 to 0xed1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a68200 INFO: task kworker/0:635:6690 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 88c22000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 r4:e0851dc0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:636 state:D stack:0 pid:6691 tgid:6691 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a68680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6e000 r7:00000000 r6:83018000 r5:00001000 r4:7f285000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1c9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3f78c r4:85a3f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3f78c r4:85a62580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6e000 r8:85a625ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62580 r8:8027ed34 r7:ed1b5e60 r6:85a62600 r5:84c6e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a68340 INFO: task kworker/0:636:6691 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8904c000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:6692 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:6692 tgid:6692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed1d9d84 r8:00000002 r7:60000113 r6:ed1d9d8c r5:84c6a400 r4:84c6a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84c6a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a68880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6a400 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1d5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3fb8c r4:85a3f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3fb8c r4:85a62680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6a400 r8:85a626ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62680 r8:8027ed34 r7:ed1c1e60 r6:85a62700 r5:84c6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d9fb0 to 0xed1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a685c0 INFO: task kworker/0:637:6692 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8904c000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:638:6696 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:638 state:D stack:0 pid:6696 tgid:6696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed1cdd84 r8:00000002 r7:60000113 r6:ed1cdd8c r5:85328000 r4:85328000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85328000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a68b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85328000 r7:00000000 r6:83018000 r5:00001000 r4:7f28b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1f1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3038c r4:85b30000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3038c r4:85a62780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85328000 r8:85a627ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62780 r8:8027ed34 r7:ed1d9e60 r6:85a62800 r5:85328000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1cdfb0 to 0xed1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a68700 INFO: task kworker/0:638:6696 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 892fb000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:639 state:D stack:0 pid:6697 tgid:6697 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a689c0 r5:85a3ff8c r4:85a3fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a68840 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:00001000 r4:dff1d000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 Exception stack(0xe0851fb0 to 0xe0851ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85329800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f5e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3078c r4:85b30400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3078c r4:85a62980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85329800 r8:85a629ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62980 r8:8027ed34 r7:ed1cde60 r6:85a62a00 r5:85329800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f5fb0 to 0xed1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a68940 INFO: task kworker/0:640:6700 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8988f000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:6701 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:6701 tgid:6701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed201d84 r8:00000002 r7:60000113 r6:ed201d8c r5:8532a400 r4:8532a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed201e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a68f00 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b30b8c r4:85b30800 r10:61c88647 r9:8532a400 r8:85a62aac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xed201fb0 to 0xed201ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85a68940 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 89b58000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:642:6704 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:642 state:D stack:0 pid:6704 tgid:6704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed1ddd84 r8:00000002 r7:60000013 r6:ed1ddd8c r5:8532c800 r4:8532c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b31b8c r4:85b31800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b31b8c r4:85a62b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532c800 r8:85a62bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62b80 r8:8027ed34 r7:ed201e60 r6:85a62c00 r5:8532c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1ddfb0 to 0xed1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a68d80 INFO: task kworker/0:642:6704 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 89e8c000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:6706 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:6706 tgid:6706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed22dd84 r8:00000002 r7:60000113 r6:ed22dd8c r5:8532d400 r4:8532d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c440 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532d400 r7:00000000 r6:83018000 r5:00001000 r4:7f293000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed21d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b30f8c r4:85b30c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b30f8c r4:85a62c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532d400 r8:85a62cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62c80 r8:8027ed34 r7:ed1dde60 r6:85a62d00 r5:8532d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed22dfb0 to 0xed22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4ce40 INFO: task kworker/0:643:6706 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8a1dc000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:6707 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:6707 tgid:6707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed039d84 r8:00000002 r7:60000013 r6:ed039d8c r5:8532bc00 r4:8532bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed039e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f480 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3178c r4:85b31400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3178c r4:85a62d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532bc00 r8:85a62dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62d80 r8:8027ed34 r7:ed1dde60 r6:85a62e00 r5:8532bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed039fb0 to 0xed039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f040 INFO: task kworker/0:644:6707 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8a3f1000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:645:6711 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:6711 tgid:6711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed20dd84 r8:00000002 r7:60000113 r6:ed20dd8c r5:85a8d400 r4:85a8d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a8d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed20de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b31f8c r4:85b31c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b31f8c r4:85a62e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8d400 r8:85a62eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62e80 r8:8027ed34 r7:ed1dde60 r6:85a4e380 r5:85a8d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed20dfb0 to 0xed20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f500 INFO: task kworker/0:645:6711 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8a74c000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:646:6713 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:646 state:D stack:0 pid:6713 tgid:6713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed221d84 r8:00000002 r7:60000013 r6:ed221d8c r5:85a8ec00 r4:85a8ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a8ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed221e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f880 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3238c r4:85b32000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3238c r4:85a62f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8ec00 r8:85a62f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62f00 r8:8027ed34 r7:ed20de60 r6:85a4e400 r5:85a8ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed221fb0 to 0xed221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f580 INFO: task kworker/0:646:6713 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8a8a1000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:6714 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:6714 tgid:6714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed239d84 r8:00000002 r7:60000113 r6:ed239d8c r5:85a8bc00 r4:85a8bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a8bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed239e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f9c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3278c r4:85b32400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3278c r4:85a62f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8bc00 r8:85a62fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a62f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a62f80 r8:8027ed34 r7:ed221e60 r6:85a4e480 r5:85a8bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed239fb0 to 0xed239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f700 INFO: task kworker/0:647:6714 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8ab6f000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:6717 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:6717 tgid:6717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed23dd84 r8:00000002 r7:60000013 r6:ed23dd8c r5:85a8a400 r4:85a8a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a8a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed23de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7fb00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f16d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b32b8c r4:85b32800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b32b8c r4:85b68000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a8a400 r8:85b6802c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68000 r8:8027ed34 r7:ed239e60 r6:85a4e500 r5:85a8a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed23dfb0 to 0xed23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f840 INFO: task kworker/0:648:6717 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8ad30000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:6719 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:6719 tgid:6719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed241d84 r8:00000002 r7:60000113 r6:ed241d8c r5:85a88c00 r4:85a88c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a88c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed241e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7fc40 r5:85b32f8c r4:85b32c00 r4:85b68080 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed241fb0 to 0xed241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f980 INFO: task kworker/0:649:6719 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8b0d7000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:650:6721 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:650 state:D stack:0 pid:6721 tgid:6721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8594b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed245e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7fd80 r5:85b3338c r4:85b33000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dff1d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed249e08 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85b68180 Exception stack(0xed249fb0 to 0xed249ff8) r4:85a7fc00 INFO: task kworker/0:651:6723 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8b7d0000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:6724 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:6724 tgid:6724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed24dd84 r8:00000002 r7:60000013 r6:ed24dd8c r5:85a90c00 r4:85a90c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a90c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed24de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7ff40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f17b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3378c r4:85b33400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3378c r4:85b68200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a90c00 r8:85b6822c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68200 r8:8027ed34 r7:ed249e60 r6:85a4e700 r5:85a90c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed24dfb0 to 0xed24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7fa40 Workqueue: events bpf_prog_free_deferred 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dff1d000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 Exception stack(0xe0851fb0 to 0xe0851ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:6728 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:6728 tgid:6728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed25dd84 r8:00000002 r7:60000013 r6:ed25dd8c r5:85a91800 r4:85a91800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a91800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed25de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7d040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a91800 r7:00000000 r6:83018000 r5:00001000 r4:7f17f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b33f8c r4:85b33c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b33f8c r4:85b68280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a91800 r8:85b682ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68280 r8:8027ed34 r7:ed249e60 r6:85a4e780 r5:85a91800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed25dfb0 to 0xed25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7d080 INFO: task kworker/0:653:6728 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:dff1d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:654 state:D stack:0 pid:6729 tgid:6729 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed261e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eca6b000 r5:85b3838c r4:85b38000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 r4:00000000 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:6731 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:6731 tgid:6731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed265d84 r8:00000002 r7:60000013 r6:ed265d8c r5:85a92400 r4:85a92400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a92400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed265e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7d4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f183000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca93000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3878c r4:85b38400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3878c r4:85b68380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a92400 r8:85b683ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68380 r8:8027ed34 r7:ed261e60 r6:85a4e880 r5:85a92400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed265fb0 to 0xed265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7d180 INFO: task kworker/0:655:6731 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8be47000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:6734 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:6734 tgid:6734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed271d84 r8:00000002 r7:60000013 r6:ed271d8c r5:85a96000 r4:85a96000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a96000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed271e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7d5c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a96000 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b38b8c r4:85b38800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b38b8c r4:85b68400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a96000 r8:85b6842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68400 r8:8027ed34 r7:ed265e60 r6:85a4e900 r5:85a96000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed271fb0 to 0xed271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7d380 INFO: task kworker/0:656:6734 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8c088000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:6735 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:6735 tgid:6735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed275d84 r8:00000002 r7:60000013 r6:ed275d8c r5:85a94800 r4:85a94800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a94800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed275e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7d740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a94800 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b38f8c r4:85b38c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b38f8c r4:85b68480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a94800 r8:85b684ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68480 r8:8027ed34 r7:ed271e60 r6:85a4e980 r5:85a94800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed275fb0 to 0xed275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:6737 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:6737 tgid:6737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed27dd84 r8:00000002 r7:60000013 r6:ed27dd8c r5:85a93000 r4:85a93000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a93000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed27de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7d240 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a93000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd11000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3ab8c r4:85b3a800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3ab8c r4:85b68500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a93000 r8:85b6852c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68500 r8:8027ed34 r7:ed275e60 r6:85a4ea00 r5:85a93000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed27dfb0 to 0xed27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7d6c0 INFO: task kworker/0:658:6737 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8c360000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:6739 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:6739 tgid:6739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed285d84 r8:00000002 r7:60000113 r6:ed285d8c r5:85a98c00 r4:85a98c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a98c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed285e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7d800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3938c r4:85b39000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3938c r4:85b68580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a98c00 r8:85b685ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68580 r8:8027ed34 r7:ed27de60 r6:85a4ea80 r5:85a98c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed285fb0 to 0xed285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7d7c0 INFO: task kworker/0:659:6739 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8c74a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85a9a400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed28de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7da00 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85b3978c r4:85b39400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3978c r4:85b68600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9a400 r8:85b6862c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68600 r8:8027ed34 r7:ed27de60 r6:85a4eb00 r5:85a9a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed28dfb0 to 0xed28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7d680 INFO: task kworker/0:660:6741 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8c74a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r5:85a98000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed291e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed291fb0 to 0xed291ff8) r4:85a7d880 Workqueue: events bpf_prog_free_deferred r5:80070113 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed29de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85b68700 r8:8027ed34 r7:ed27de60 r6:85a4ec00 r5:85a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed29dfb0 to 0xed29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7d900 INFO: task kworker/0:662:6745 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8cc59000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:6746 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:6746 tgid:6746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2a1d84 r8:00000002 r7:60000113 r6:ed2a1d8c r5:85a9b000 r4:85a9b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a9b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7dd80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3a38c r4:85b3a000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3a38c r4:85b68780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9b000 r8:85b687ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68780 r8:8027ed34 r7:ed27de60 r6:85a4ec80 r5:85a9b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a1fb0 to 0xed2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7dac0 INFO: task kworker/0:663:6746 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8cc59000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:6748 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:664 state:D stack:0 pid:6748 tgid:6748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2a9d84 r8:00000002 r7:60000013 r6:ed2a9d8c r5:85a9d400 r4:85a9d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a9d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7dec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3a78c r4:85b3a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3a78c r4:85b68800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9d400 r8:85b6882c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68800 r8:8027ed34 r7:ed27de60 r6:85a4ed00 r5:85a9d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a9fb0 to 0xed2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7dc00 INFO: task kworker/0:664:6748 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8d2b4000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:665 state:D stack:0 pid:6751 tgid:6751 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b3af8c r4:85b3ac00 r4:85b68880 Exception stack(0xed2adfb0 to 0xed2adff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070113 ffffffff r4:00000000 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:666:6754 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:666 state:D stack:0 pid:6754 tgid:6754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2a5d84 r8:00000002 r7:60000013 r6:ed2a5d8c r5:85a9e000 r4:85a9e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a9e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a71cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1f3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed03b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3b38c r4:85b3b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3b38c r4:85b68900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9e000 r8:85b6892c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68900 r8:8027ed34 r7:ed2ade60 r6:85a4ee00 r5:85a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a5fb0 to 0xed2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7fdc0 INFO: task kworker/0:666:6754 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8d68c000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r4:84345d80 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:667:6755 blocked for more than 478 seconds. r5:85a9ec00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2b1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ed049000 r10:61c88647 r9:85a9ec00 r8:85b689ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 8d85e000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:668:6758 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:668 state:D stack:0 pid:6758 tgid:6758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2b5d84 r8:00000002 r7:60000113 r6:ed2b5d8c r5:85a99800 r4:85a99800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a99800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b79040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a99800 r7:00000000 r6:83018000 r5:00001000 r4:7f1fb000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed05b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3bb8c r4:85b3b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3bb8c r4:85b68a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a99800 r8:85b68a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68a00 r8:8027ed34 r7:ed2b1e60 r6:85a4ef00 r5:85a99800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2b5fb0 to 0xed2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f140 INFO: task kworker/0:668:6758 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8dd1b000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:6760 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:6760 tgid:6760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2b9d84 r8:00000002 r7:60000013 r6:ed2b9d8c r5:85a96c00 r4:85a96c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a96c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b79300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1fd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0851dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:670:6762 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:670 state:D stack:0 pid:6762 tgid:6762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2bdd84 r8:00000002 r7:60000013 r6:ed2bdd8c r5:85a95400 r4:85a95400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a95400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b79500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a95400 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed079000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3c38c r4:85b3c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3c38c r4:85b68b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a95400 r8:85b68b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68b00 r8:8027ed34 r7:ed2b9e60 r6:85b7f000 r5:85a95400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2bdfb0 to 0xed2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b79180 INFO: task kworker/0:670:6762 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 Exception stack(0xe0851d20 to 0xe0851d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:671 state:D stack:0 pid:6764 tgid:6764 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed259e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85aa0000 r7:00000000 r6:83018000 r5:00001000 r4:7f203000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3c78c r4:85b3c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3c78c r4:85b68b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa0000 r8:85b68bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68b80 r8:8027ed34 r7:ed2bde60 r6:85b7f080 r5:85aa0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed259fb0 to 0xed259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b79200 INFO: task kworker/0:671:6764 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8e5ce000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:672 state:D stack:0 pid:6767 tgid:6767 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed2c1fb0 to 0xed2c1ff8) r4:85b79400 r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:e0851dc0 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b79740 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3cb8c r4:85b3c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3cb8c r4:85b68c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa1800 r8:85b68cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68c80 r8:8027ed34 r7:ed2c1e60 r6:85b7f180 r5:85aa1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c5fb0 to 0xed2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b795c0 INFO: task kworker/0:673:6769 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8e94d000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:6771 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:6771 tgid:6771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2c9d84 r8:00000002 r7:60000013 r6:ed2c9d8c r5:85aa2400 r4:85aa2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b79b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f26b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3d78c r4:85b3d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3d78c r4:85b68d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa2400 r8:85b68d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68d00 r8:8027ed34 r7:ed2c1e60 r6:85b7f200 r5:85aa2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c9fb0 to 0xed2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b79540 INFO: task kworker/0:674:6771 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8ed22000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:6773 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/0:675 state:D stack:0 pid:6773 tgid:6773 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b799c0 r4:00000000 r9:83018005 r8:85aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f269000 r7:dddced40 r6:83018000 r5:85b3d38c r4:85b68d80 r10:00000000 r9:85b68d80 r8:8027ed34 r7:ed2c9e60 r6:85b7f280 r5:85aa3000 dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b798c0 INFO: task kworker/0:675:6773 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8ed22000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:6775 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:6775 tgid:6775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed0ddd84 r8:00000002 r7:60000013 r6:ed0ddd8c r5:85aa4800 r4:85aa4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b79c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa4800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3db8c r4:85b3d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3db8c r4:85b68e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa4800 r8:85b68e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68e00 r8:8027ed34 r7:ed2c9e60 r6:85b7f300 r5:85aa4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0ddfb0 to 0xed0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b79a00 INFO: task kworker/0:676:6775 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8f05a000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:677 state:D stack:0 pid:6777 tgid:6777 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:85b3f38c r4:85b3f000 r4:85b68e80 Exception stack(0xed2d9fb0 to 0xed2d9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0851d20 to 0xe0851d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84345d80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:678:6781 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:678 state:D stack:0 pid:6781 tgid:6781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed185d84 r8:00000002 r7:60000113 r6:ed185d8c r5:8532ec00 r4:8532ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed185e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b79fc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3df8c r4:85b3dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3df8c r4:85b68f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532ec00 r8:85b68fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b68f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b68f80 r8:8027ed34 r7:ed2d9e60 r6:85b76000 r5:8532ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b79d40 INFO: task kworker/0:678:6781 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8fb75000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:679:6783 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:679 state:D stack:0 pid:6783 tgid:6783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed19dd84 r8:00000002 r7:60000013 r6:ed19dd8c r5:85b08c00 r4:85b08c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b08c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed19de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f26f40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebed3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3e38c r4:85b3e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3e38c r4:85b76080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b08c00 r8:85b760ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76080 r8:8027ed34 r7:ed2d9e60 r6:85b76100 r5:85b08c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed19dfb0 to 0xed19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84f26e80 INFO: task kworker/0:679:6783 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 8fe50000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84d287c0 INFO: task kworker/0:680:6785 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:6785 tgid:6785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2ddd84 r8:00000002 r7:60000013 r6:ed2ddd8c r5:85b08000 r4:85b08000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b08000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b72040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b08000 r7:00000000 r6:83018000 r5:00001000 r4:7f207000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf75000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3e78c r4:85b3e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3e78c r4:85b76180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b08000 r8:85b761ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76180 r8:8027ed34 r7:ed2d9e60 r6:85b76200 r5:85b08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2ddfb0 to 0xed2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b72100 INFO: task kworker/0:680:6785 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 901af000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:6787 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:6787 tgid:6787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2e5d84 r8:00000002 r7:60000113 r6:ed2e5d8c r5:85b0b000 r4:85b0b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b0b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b72900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f21f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3ef8c r4:85b3ec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3ef8c r4:85b76280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b0b000 r8:85b762ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76280 r8:8027ed34 r7:ed2d9e60 r6:85b76300 r5:85b0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2e5fb0 to 0xed2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b72000 INFO: task kworker/0:681:6787 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 90602000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:6793 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:6793 tgid:6793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2f5d84 r8:00000002 r7:60000113 r6:ed2f5d8c r5:85b0bc00 r4:85b0bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b0bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b72e00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f229000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3fb8c r4:85b3f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3fb8c r4:85b76380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b0bc00 r8:85b763ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76380 r8:8027ed34 r7:ed2d9e60 r6:85b76400 r5:85b0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f5fb0 to 0xed2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b72880 INFO: task kworker/0:682:6793 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 907f1000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84345d80 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:6795 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:6795 tgid:6795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2f9d84 r8:00000002 r7:60000013 r6:ed2f9d8c r5:85b09800 r4:85b09800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b09800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b72c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b09800 r7:00000000 r6:83018000 r5:00001000 r4:7f225000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3f78c r4:85b3f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3f78c r4:85b76480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b09800 r8:85b764ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76480 r8:8027ed34 r7:ed2f5e60 r6:85b76500 r5:85b09800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f9fb0 to 0xed2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b72b00 INFO: task kworker/0:683:6795 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 90a4d000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:6797 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:6797 tgid:6797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed2fdd84 r8:00000002 r7:60000113 r6:ed2fdd8c r5:85b0d400 r4:85b0d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b0d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b72640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f22b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc33000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3ff8c r4:85b3fc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b3ff8c r4:85b76580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b0d400 r8:85b765ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76580 r8:8027ed34 r7:ed2f5e60 r6:85b76600 r5:85b0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2fdfb0 to 0xed2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b72c00 INFO: task kworker/0:684:6797 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 90a4d000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:6799 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:6799 tgid:6799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed301d84 r8:00000002 r7:60000113 r6:ed301d8c r5:85b0c800 r4:85b0c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b0c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed301e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b69040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f22f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc7b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4878c r4:85b48400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b4878c r4:85b76680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b0c800 r8:85b766ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76680 r8:8027ed34 r7:ed2fde60 r6:85b76700 r5:85b0c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed301fb0 to 0xed301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b72880 INFO: task kworker/0:685:6799 is blocked on a mutex likely owned by task kworker/1:337:3938. task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0851d20 to 0xe0851d68) 1d20: 90a4d000 edc49000 00000001 80239bb8 7f3a7000 00000001 82ac11c4 82ac05a0 1d40: 7f3a7000 edc49000 8280c9b4 e0851d9c e0851da0 e0851d70 80230af4 80239bd0 1d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:686:6801 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:6801 tgid:6801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed305d84 r8:00000002 r7:60000113 r6:ed305d8c r5:85b0a400 r4:85b0a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85b0a400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed305e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f26c40 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85b76780 r8:8027ed34 r7:ed301e60 r6:85b76800 r5:85b0a400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:337 state:R running task stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8506e000 r8:80200be4 r7:e0851d54 r6:ffffffff r5:8506e000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0851dc0 r5:e0851e08 r4:e0851dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d28c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec78c r4:84345d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8506e000 r8:84345dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84345d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84345d80 r8:8027ed34 r7:e0839e60 r6:84345e00 r5:8506e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0851fb0 to 0xe0851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84d287c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:6802 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:6802 tgid:6802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ed309d84 r8:00000002 r7:60000113 r6:ed309d8c r5:8532e000 r4:8532e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8532e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed309e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b694c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8532e000 r7:00000000 r6:83018000 r5:00001000 r4:7f233000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd79000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b48b8c r4:85b48800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b48b8c r4:85b76880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532e000 r8:85b768ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b76880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b76880 r8:8027ed34 r7:ed301e60 r6:85b76900 r5:8532e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed309fb0 to 0xed309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b69100 INFO: task kworker/0:687:6802 is blocked on a mutex likely owned by task kworker/1:337:3938. r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)