Extracting prog: 11m23.188889763s Minimizing prog: 1h15m38.772044124s Simplifying prog options: 0s Extracting C: 9m34.022026871s Simplifying C: 59m3.067987757s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h35m39.050982885s repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df879d84 r8:00000002 r7:60000013 r6:df879d8c r5:8324a400 r4:8324a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa6f8c r4:85aa6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aa6f8c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: db377000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/0:2:99 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:99 tgid:99 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:838b6c00 r4:838b6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85314980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85524f8c r4:85524c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85524f8c r4:83362f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b6c00 r8:83362f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:83362f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83362f00 r8:8027ed34 r7:df83de60 r6:83340480 r5:838b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:838e2640 INFO: task kworker/0:2:99 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: db744000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/0:3:102 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:102 tgid:102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:838b0000 r4:838b0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85225240 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0627000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536af8c r4:8536ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8536af8c r4:83362f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b0000 r8:83362fac r7:82804d40 r6:dddced40 r5:dddced60 r4:83362f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83362f80 r8:8027ed34 r7:df9cde60 r6:83340500 r5:838b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8335eec0 INFO: task kworker/0:3:102 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dbada000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/0:0:3092 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3092 tgid:3092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df981d84 r8:00000002 r7:60000113 r6:df981d8c r5:84128c00 r4:84128c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84128c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bca40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84128c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536b78c r4:8536b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8536b78c r4:848f8e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84128c00 r8:848f8eac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f8e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f8e80 r8:8027ed34 r7:df9cde60 r6:848f8d80 r5:84128c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7840 INFO: task kworker/0:0:3092 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dbeb5000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/1:3:3106 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3106 tgid:3106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df999d84 r8:00000002 r7:60000113 r6:df999d8c r5:83240000 r4:83240000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df999e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83240000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549cf8c r4:8549cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549cf8c r4:84946c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240000 r8:84946cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946c80 r8:8027ed34 r7:df919e60 r6:848f8e00 r5:83240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf999fb0 to 0xdf999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846b6180 INFO: task kworker/1:3:3106 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dc61c000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/1:5:3109 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3109 tgid:3109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:840eec00 r4:840eec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840eec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb4b8c r4:84bb4800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb4b8c r4:84946b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840eec00 r8:84946bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946b80 r8:8027ed34 r7:df999e60 r6:848f8f00 r5:840eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467a080 INFO: task kworker/1:5:3109 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dc9e0000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/1:6:3111 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3111 tgid:3111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:840ee000 r4:840ee000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ee000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb5b8c r4:84bb5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb5b8c r4:84946c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ee000 r8:84946c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946c00 r8:8027ed34 r7:df999e60 r6:848f8680 r5:840ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2100 INFO: task kworker/1:6:3111 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dcced000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/1:7:3113 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3113 tgid:3113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:842fe000 r4:842fe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842fe000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bec00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb5f8c r4:84bb5c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb5f8c r4:84946d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842fe000 r8:84946d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946d00 r8:8027ed34 r7:df999e60 r6:832a1900 r5:842fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2140 INFO: task kworker/1:7:3113 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dd11a000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/1:8:3115 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:842fb000 r4:842fb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842fb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb778c r4:84bb7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb778c r4:84946d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842fb000 r8:84946dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946d80 r8:8027ed34 r7:df999e60 r6:832a1700 r5:842fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f22c0 INFO: task kworker/1:8:3115 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dd11a000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 INFO: task kworker/1:9:3117 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:842f8c00 r4:842f8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842f8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a8d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb7b8c r4:84bb7800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb7b8c r4:84946e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842f8c00 r8:84946e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946e00 r8:8027ed34 r7:df999e60 r6:832adc00 r5:842f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f23c0 INFO: task kworker/1:9:3117 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dd4a6000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3119 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:842fc800 r4:842fc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842fc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512878c r4:85128400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512878c r4:84946e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842fc800 r8:84946eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946e80 r8:8027ed34 r7:df999e60 r6:832adb80 r5:842fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2540 INFO: task kworker/1:10:3119 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dd7b2000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3121 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:842fbc00 r4:842fbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842fbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523de40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e378c r4:851e3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e378c r4:84946f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842fbc00 r8:84946f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946f00 r8:8027ed34 r7:df999e60 r6:8420f280 r5:842fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2880 INFO: task kworker/1:11:3121 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dd7b2000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3123 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:842fa400 r4:842fa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842fa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85280900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea851000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:842e478c r4:842e4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:842e478c r4:84946f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842fa400 r8:84946fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946f80 r8:8027ed34 r7:df999e60 r6:8420f200 r5:842fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2980 INFO: task kworker/1:12:3123 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ddd06000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3125 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:842f9800 r4:842f9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842f9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f7040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df99d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b8f8c r4:852b8c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b8f8c r4:84946a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842f9800 r8:84946aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946a80 r8:8027ed34 r7:df999e60 r6:83375300 r5:842f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2800 INFO: task kworker/1:13:3125 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ddd06000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3127 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:842f8000 r4:842f8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842f8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f238c r4:853f2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f238c r4:84946780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842f8000 r8:849467ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946780 r8:8027ed34 r7:df999e60 r6:83375280 r5:842f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2a00 INFO: task kworker/1:14:3127 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ddd06000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3133 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:842fd400 r4:842fd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842fd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546ed40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549f78c r4:8549f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549f78c r4:84946800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842fd400 r8:8494682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946800 r8:8027ed34 r7:df999e60 r6:830b8480 r5:842fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2f80 INFO: task kworker/1:15:3133 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: de216000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3134 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa81d84 r8:00000002 r7:60000013 r6:dfa81d8c r5:842fec00 r4:842fec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842fec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f2f8c r4:855f2c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855f2f8c r4:84946a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842fec00 r8:84946a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946a00 r8:8027ed34 r7:dfa75e60 r6:830b8400 r5:842fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f2f80 INFO: task kworker/1:16:3134 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: de216000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1:3135 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:83240c00 r4:83240c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85208e00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854aa38c r4:854aa000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854aa38c r4:830b8680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240c00 r8:830b86ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8680 r8:8027ed34 r7:df9cde60 r6:830b8580 r5:83240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f9340 INFO: task kworker/0:1:3135 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: de4da000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3138 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83c38000 r4:83c38000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c38000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014100 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c38000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854aa78c r4:854aa400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854aa78c r4:8398cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c38000 r8:8398cdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8398cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8398cd80 r8:8027ed34 r7:dfa89e60 r6:8398cd00 r5:83c38000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f9c40 INFO: task kworker/0:4:3138 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: de78a000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3139 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:83c3b000 r4:83c3b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c3b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb293000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a9f8c r4:854a9c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a9f8c r4:83358f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c3b000 r8:83358fac r7:82804d40 r6:dddced40 r5:dddced60 r4:83358f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358f80 r8:8027ed34 r7:dfa8de60 r6:830b8780 r5:83c3b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496c100 INFO: task kworker/0:5:3139 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: de78a000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3141 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83c38c00 r4:83c38c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c38c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014d80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854aab8c r4:854aa800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854aab8c r4:830b8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c38c00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ed34 r7:dfa8de60 r6:84602c80 r5:83c38c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496c100 INFO: task kworker/0:6:3141 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dea48000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3143 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:83c3a400 r4:83c3a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c3a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b65540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e0f8c r4:850e0c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e0f8c r4:845fd680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c3a400 r8:845fd6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:845fd680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845fd680 r8:8027ed34 r7:dfa8de60 r6:845fdc80 r5:83c3a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496c080 INFO: task kworker/0:7:3143 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dea48000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3146 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:833b8000 r4:833b8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833b8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b56080 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb325000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ab78c r4:854ab400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ab78c r4:84968000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833b8000 r8:8496802c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968000 r8:8027ed34 r7:dfaa9e60 r6:84968080 r5:833b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496c680 INFO: task kworker/0:8:3146 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ded0d000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3147 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:83c3d400 r4:83c3d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c3d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84964180 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c3d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573338c r4:85733000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8573338c r4:84968100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c3d400 r8:8496812c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968100 r8:8027ed34 r7:dfab9e60 r6:84968180 r5:83c3d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496c980 INFO: task kworker/0:9:3147 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ded0d000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3150 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfacdd84 r8:00000002 r7:60000013 r6:dfacdd8c r5:83aee000 r4:83aee000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aee000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a2640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aee000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845d1b8c r4:845d1800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845d1b8c r4:84968200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aee000 r8:8496822c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968200 r8:8027ed34 r7:dfac5e60 r6:84968280 r5:83aee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496cb80 INFO: task kworker/0:10:3150 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: df516000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3152 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:83ae8c00 r4:83ae8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ae8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ae8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd73000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa638c r4:85aa6000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aa638c r4:84946880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae8c00 r8:849468ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946880 r8:8027ed34 r7:dfa81e60 r6:84968300 r5:83ae8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849630c0 INFO: task kworker/1:17:3152 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: df516000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3153 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83aed400 r4:83aed400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aed400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aed400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564f38c r4:8564f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564f38c r4:84968380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aed400 r8:849683ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84968380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968380 r8:8027ed34 r7:dfac5e60 r6:84968400 r5:83aed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8496cdc0 INFO: task kworker/0:11:3153 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: df516000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3154 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83c3ec00 r4:83c3ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c3ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c2780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83c3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb01000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586f78c r4:8586f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586f78c r4:84946980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c3ec00 r8:849469ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946980 r8:8027ed34 r7:dfadde60 r6:84968480 r5:83c3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849630c0 INFO: task kworker/1:18:3154 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: df921000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3157 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfad9d84 r8:00000002 r7:60000013 r6:dfad9d8c r5:833be000 r4:833be000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833be000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b536c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833be000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566078c r4:85660400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566078c r4:84968500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833be000 r8:8496852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968500 r8:8027ed34 r7:dfac5e60 r6:84968580 r5:833be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964180 INFO: task kworker/0:12:3157 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: df921000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3158 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:838c6c00 r4:838c6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69ac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85720f8c r4:85720c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85720f8c r4:84968600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c6c00 r8:8496862c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968600 r8:8027ed34 r7:dfac5e60 r6:84968680 r5:838c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964180 INFO: task kworker/0:13:3158 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dfdec000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3161 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:838c5400 r4:838c5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8496a300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf75000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e678c r4:845e6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845e678c r4:84968700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c5400 r8:8496872c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968700 r8:8027ed34 r7:dfac5e60 r6:84968780 r5:838c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964240 INFO: task kworker/0:14:3161 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: dfdec000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3163 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:838c0000 r4:838c0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547cf00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec909000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583878c r4:85838400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8583878c r4:84968800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c0000 r8:8496882c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968800 r8:8027ed34 r7:dfaf9e60 r6:84968880 r5:838c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964300 INFO: task kworker/0:15:3163 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e0111000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3164 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:838c4800 r4:838c4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb341000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574cb8c r4:8574c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8574cb8c r4:84968900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c4800 r8:8496892c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968900 r8:8027ed34 r7:dfb05e60 r6:84968980 r5:838c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964300 INFO: task kworker/0:16:3164 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e0111000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3168 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:838c0c00 r4:838c0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d8c00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585e38c r4:8585e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585e38c r4:84968a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c0c00 r8:84968a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968a00 r8:8027ed34 r7:dfb05e60 r6:84968a80 r5:838c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964740 INFO: task kworker/0:17:3168 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e043d000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3170 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:838c3c00 r4:838c3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f478c r4:858f4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858f478c r4:84968b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c3c00 r8:84968b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968b00 r8:8027ed34 r7:dfb19e60 r6:84968b80 r5:838c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964740 INFO: task kworker/0:18:3170 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e043d000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3172 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:838c2400 r4:838c2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b780 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f778c r4:858f7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858f778c r4:84968c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c2400 r8:84968c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968c00 r8:8027ed34 r7:dfb19e60 r6:84968c80 r5:838c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964a40 INFO: task kworker/0:19:3172 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e0848000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3174 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:838c6000 r4:838c6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf37000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a13f8c r4:85a13c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a13f8c r4:84968d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c6000 r8:84968d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968d00 r8:8027ed34 r7:dfb19e60 r6:84968d80 r5:838c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964b00 INFO: task kworker/0:20:3174 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e0edf000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3176 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:838c1800 r4:838c1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518adc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb39000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a10f8c r4:85a10c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a10f8c r4:84968e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c1800 r8:84968e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968e00 r8:8027ed34 r7:dfb3de60 r6:84968e80 r5:838c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84964d00 INFO: task kworker/0:21:3176 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e0edf000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3178 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb51d84 r8:00000002 r7:60000013 r6:dfb51d8c r5:83ada400 r4:83ada400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ada400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad88c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ada400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd43000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa5f8c r4:85aa5c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aa5f8c r4:84946900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ada400 r8:8494692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946900 r8:8027ed34 r7:dfadde60 r6:845fd880 r5:83ada400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84963a00 INFO: task kworker/1:19:3178 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e0edf000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3179 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83ad9800 r4:83ad9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ad9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e4200 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad9800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb79000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a11f8c r4:85a11c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a11f8c r4:84968f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad9800 r8:84968f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84968f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84968f00 r8:8027ed34 r7:dfb3de60 r6:84968f80 r5:83ad9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494f100 INFO: task kworker/0:22:3179 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e159e000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3181 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:83ad3000 r4:83ad3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ad3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84969840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad3000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2c3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a12b8c r4:85a12800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a12b8c r4:84602880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad3000 r8:846028ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84602880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84602880 r8:8027ed34 r7:dfb3de60 r6:8488a000 r5:83ad3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494f200 INFO: task kworker/0:23:3181 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e1ce6000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3182 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:8324c800 r4:8324c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed185000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a41b8c r4:85a41800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a41b8c r4:8488a080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324c800 r8:8488a0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a080 r8:8027ed34 r7:dfb3de60 r6:8488a100 r5:8324c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494f480 INFO: task kworker/0:24:3182 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e1ce6000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3185 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb79d84 r8:00000002 r7:60000013 r6:dfb79d8c r5:83ad1800 r4:83ad1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ad1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adbf00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed093000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab3f8c r4:85ab3c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab3f8c r4:8488a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad1800 r8:8488a1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a180 r8:8027ed34 r7:dfb6de60 r6:8488a200 r5:83ad1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494f640 INFO: task kworker/0:25:3185 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e1ce6000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3188 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:84146c00 r4:84146c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84146c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84146c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdb9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa6b8c r4:85aa6800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aa6b8c r4:84946700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84146c00 r8:8494672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946700 r8:8027ed34 r7:dfadde60 r6:8488a280 r5:84146c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84963b40 INFO: task kworker/1:20:3188 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e297c000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3189 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb95d84 r8:00000002 r7:60000013 r6:dfb95d8c r5:84143c00 r4:84143c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84143c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494f200 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84143c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e8f8c r4:845e8c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:845e8f8c r4:84946680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84143c00 r8:849466ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946680 r8:8027ed34 r7:dfb91e60 r6:8488a300 r5:84143c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84963b40 INFO: task kworker/1:21:3189 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e297c000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3191 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:838b4800 r4:838b4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af3f40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb83000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4278c r4:85a42400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4278c r4:8488a380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b4800 r8:8488a3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a380 r8:8027ed34 r7:dfb6de60 r6:8488a400 r5:838b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494fa40 INFO: task kworker/0:26:3191 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e3033000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3193 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:838b5400 r4:838b5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f189000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed51f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a43b8c r4:85a43800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a43b8c r4:8488a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b5400 r8:8488a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a480 r8:8027ed34 r7:dfb8de60 r6:8488a500 r5:838b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf975fb0 to 0xdf975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494fb40 INFO: task kworker/0:27:3193 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e3033000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3195 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb81d84 r8:00000002 r7:60000013 r6:dfb81d8c r5:84124800 r4:84124800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84124800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848dc4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84124800 r7:00000000 r6:83018000 r5:00001000 r4:7f255000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7d5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845ea38c r4:845ea000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845ea38c r4:8488a580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84124800 r8:8488a5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a580 r8:8027ed34 r7:df975e60 r6:8488a600 r5:84124800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8494fec0 INFO: task kworker/0:28:3195 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e3a1c000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3197 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfba9d84 r8:00000002 r7:60000013 r6:dfba9d8c r5:84123c00 r4:84123c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84123c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c2a7c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f251000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb09000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845eab8c r4:845ea800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845eab8c r4:8488a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84123c00 r8:8488a6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a680 r8:8027ed34 r7:dfb81e60 r6:8488a700 r5:84123c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dc000 INFO: task kworker/0:29:3197 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e3a1c000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3200 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbb5d84 r8:00000002 r7:60000013 r6:dfbb5d8c r5:84126000 r4:84126000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84126000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848dc640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84126000 r7:00000000 r6:83018000 r5:00001000 r4:7f253000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7cf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845ea78c r4:845ea400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845ea78c r4:8488a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84126000 r8:8488a7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a780 r8:8027ed34 r7:dfba9e60 r6:8488a800 r5:84126000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dc2c0 INFO: task kworker/0:30:3200 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e4492000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3201 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84122400 r4:84122400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84122400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c2ad80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84122400 r7:00000000 r6:83018000 r5:00001000 r4:7f21f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed51b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845eb38c r4:845eb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845eb38c r4:8488a900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84122400 r8:8488a92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8488a900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488a900 r8:8027ed34 r7:dfba9e60 r6:8488a980 r5:84122400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dc2c0 INFO: task kworker/0:31:3201 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e4492000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3202 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:84120c00 r4:84120c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84120c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5c500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84120c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9b3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c1278c r4:85c12400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c1278c r4:8488aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84120c00 r8:8488aa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8488aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488aa00 r8:8027ed34 r7:dfbbde60 r6:8488aa80 r5:84120c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dc2c0 INFO: task kworker/0:32:3202 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e4607000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3204 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbc9d84 r8:00000002 r7:60000013 r6:dfbc9d8c r5:84304800 r4:84304800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84304800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c2a700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84304800 r7:00000000 r6:83018000 r5:00001000 r4:7f24f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845eaf8c r4:845eac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845eaf8c r4:8488ab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84304800 r8:8488ab2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8488ab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488ab00 r8:8027ed34 r7:dfbcde60 r6:8488ab80 r5:84304800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dc480 INFO: task kworker/0:33:3204 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e4927000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3207 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:84305400 r4:84305400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84305400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84305400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdeb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa738c r4:85aa7000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aa738c r4:84946600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84305400 r8:8494662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946600 r8:8027ed34 r7:dfb95e60 r6:8488ac80 r5:84305400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84963980 INFO: task kworker/1:22:3207 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e4f18000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3209 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:84830c00 r4:84830c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84830c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5c200 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f305000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb69000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c12f8c r4:85c12c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c12f8c r4:8488ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:8488ac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8488ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488ac00 r8:8027ed34 r7:dfbcde60 r6:8488ad00 r5:84830c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dc780 INFO: task kworker/0:34:3209 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e4f18000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3211 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:84830000 r4:84830000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84830000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5c380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830000 r7:00000000 r6:83018000 r5:00001000 r4:7f301000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb5d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c12b8c r4:85c12800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c12b8c r4:8488ad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:8488adac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488ad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488ad80 r8:8027ed34 r7:dfbf5e60 r6:8488ae00 r5:84830000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dcb00 INFO: task kworker/0:35:3211 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e53fe000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3213 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84831800 r4:84831800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84831800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cce2c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84831800 r7:00000000 r6:83018000 r5:00001000 r4:7f309000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec631000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845ebb8c r4:845eb800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:845ebb8c r4:8488ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:8488aeac r7:82804d40 r6:dddced40 r5:dddced60 r4:8488ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488ae80 r8:8027ed34 r7:dfbf5e60 r6:8488af00 r5:84831800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dca40 INFO: task kworker/0:36:3213 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e53fe000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3215 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:84833000 r4:84833000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84833000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521ff40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f34f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8d5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7af8c r4:85c7ac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7af8c r4:848fb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:848fb02c r7:82804d40 r6:dddced40 r5:dddced60 r4:848fb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848fb000 r8:8027ed34 r7:dfc09e60 r6:848fb080 r5:84833000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dcf00 INFO: task kworker/0:37:3215 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e6120000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0465fb0 to 0xe0465ff8) task:kworker/0:38 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85d2038c r4:85d20000 r4:848fb100 r10:00000000 r9:848fb100 r8:8027ed34 r7:dfc09e60 r6:848fb180 r5:84833c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848980c0 INFO: task kworker/0:38:3218 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e6120000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d20: e6120000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3223 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84835400 r4:84835400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84835400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0465d20 to 0xe0465d68) 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 r4:00000001 INFO: task kworker/0:41:3224 blocked for more than 451 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdfa09fb0 to 0xdfa09ff8) Call trace: [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c99940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f45b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edccd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d1ef8c r4:85d1ec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d1ef8c r4:848fb500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836c00 r8:848fb52c r7:82804d40 r6:dddced40 r5:dddced60 r4:848fb500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848fb500 r8:8027ed34 r7:dfa09e60 r6:848fb580 r5:84836c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84898300 INFO: task kworker/0:42:3225 is blocked on a mutex likely owned by task kworker/1:107:3641. Workqueue: events bpf_prog_free_deferred r4:00000000 r5:8501cf8c r4:8501cc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84832400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8ec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84832400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece13000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa778c r4:85aa7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aa778c r4:84946580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:849465ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946580 r8:8027ed34 r7:dfb95e60 r6:848fb600 r5:84832400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4100 INFO: task kworker/1:23:3227 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84be96c0 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc2dd84 r8:00000002 r7:60000013 r6:dfc2dd8c r5:848b0000 r4:848b0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adb600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b0000 r8:8494652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6b980 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84946480 r8:8027ed34 r7:dfb95e60 r6:84946400 r5:8413b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4300 INFO: task kworker/1:25:3232 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e7315000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e75fd000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:27:3236 blocked for more than 452 seconds. Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eceed000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84946280 r8:8027ed34 r7:dfc29e60 r6:84946180 r5:84138000 1fa0: 00000000 00000000 00000000 00000000 r4:848d4580 task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3237 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:848b1800 r4:848b1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510fec0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aac38c r4:85aac000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aac38c r4:84946100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b1800 r8:8494612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946100 r8:8027ed34 r7:dfc31e60 r6:848fb700 r5:848b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4580 INFO: task kworker/1:28:3237 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:848b3000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba940 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aaeb8c r4:85aae800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aaeb8c r4:84946000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b3000 r8:8494602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946000 r8:8027ed34 r7:dfc31e60 r6:848fb780 r5:848b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4880 INFO: task kworker/1:29:3240 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e805f000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3241 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85ab0b8c r4:85ab0800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ab0b8c r4:84946080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b2400 r8:849460ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84946080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84946080 r8:8027ed34 r7:dfc49e60 r6:848fb800 r5:848b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4880 INFO: task kworker/1:30:3241 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e81ab000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0465d20 to 0xe0465d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:00000000 r5:00001000 r4:dffa3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3245 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:848b3c00 r4:848b3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba3c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece8b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab038c r4:85ab0000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ab038c r4:830cd380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b3c00 r8:830cd3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd380 r8:8027ed34 r7:dfc49e60 r6:848fb900 r5:848b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4a80 INFO: task kworker/1:32:3245 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e88b1000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r5:00001000 r4:dffa3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3247 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:848b6000 r4:848b6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abaf00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd07000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aaff8c r4:85aafc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aaff8c r4:8494b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6000 r8:8494b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494b000 r8:8027ed34 r7:dfc49e60 r6:848fb980 r5:848b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4bc0 INFO: task kworker/1:33:3247 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e88b1000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3249 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc71d84 r8:00000002 r7:60000113 r6:dfc71d8c r5:848b4800 r4:848b4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abadc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aafb8c r4:85aaf800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aafb8c r4:8494b080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b4800 r8:8494b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494b080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494b080 r8:8027ed34 r7:dfc49e60 r6:848fba00 r5:848b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848d4d00 INFO: task kworker/1:34:3249 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e90a9000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3252 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:848b6c00 r4:848b6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8494b100 r8:8027ed34 r7:dfc49e60 r6:848fba80 r5:848b6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:36 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abab80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbb3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aaf38c r4:85aaf000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aaf38c r4:8494b180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0c00 r8:8494b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e920d000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aaef8c r4:8494b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84848c00 r8:8494b22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494b200 r8:8027ed34 r7:dfc49e60 r6:848fbb80 r5:84848c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495c1c0 INFO: task kworker/1:37:3255 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r5:00001000 r4:dffa3000 r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:84be96c0 task:kworker/1:38 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r4:84b6b980 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:39 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r9:83018205 r8:8484a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r4:8494b300 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495c500 INFO: task kworker/1:39:3261 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e9850000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3262 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba6c0 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aadf8c r4:8494b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484bc00 r8:8494b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494b380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494b380 r8:8027ed34 r7:dfcb1e60 r6:848fbd00 r5:8484bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495c500 INFO: task kworker/1:40:3262 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:41 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc39e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r4:8495c5c0 INFO: task kworker/1:41:3263 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: e9f20000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3266 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:84138c00 r4:84138c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84138c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aac78c r4:85aac400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aac78c r4:8494b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84138c00 r8:8494b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494b500 r8:8027ed34 r7:dfcb1e60 r6:8494b580 r5:84138c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495c800 INFO: task kworker/1:42:3266 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d60: 800f0013 ffffffff [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:43:3269 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r5:8413bc00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba4c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8413bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3cd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aad78c r4:85aad400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aad78c r4:8494b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413bc00 r8:8494b62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494b600 r8:8027ed34 r7:dfcb1e60 r6:8494b680 r5:8413bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495cac0 INFO: task kworker/1:43:3269 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ea4ba000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 r4:00000001 Exception stack(0xe0465fb0 to 0xe0465ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:44:3270 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r5:8413d400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494b700 r8:8027ed34 r7:dfcdde60 r6:8494b780 r5:8413d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8495cbc0 INFO: task kworker/1:44:3270 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ea4ba000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3272 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcf1d84 r8:00000002 r7:60000113 r6:dfcf1d8c r5:83aeb000 r4:83aeb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aeb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aeb000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aad38c r4:85aad000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aad38c r4:8494b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495cd40 INFO: task kworker/1:45:3272 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ea72f000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3274 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:833a9800 r4:833a9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833a9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adba80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfcf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab2f8c r4:85ab2c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ab2f8c r4:8494b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a9800 r8:8494b92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494b900 r8:8027ed34 r7:dfce5e60 r6:8494b980 r5:833a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495cec0 task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3275 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:84a48000 r4:84a48000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a48000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a48000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed061000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aacb8c r4:85aac800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85aacb8c r4:8494ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a48000 r8:8494ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494ba00 r8:8027ed34 r7:dfc35e60 r6:8494ba80 r5:84a48000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976080 INFO: task kworker/1:47:3275 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: eaef5000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:48:3280 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adbc80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a49800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfeb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab338c r4:85ab3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ab338c r4:8494bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a49800 r8:8494bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494bb00 r8:8027ed34 r7:dfc35e60 r6:8494bc00 r5:84a49800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849763c0 INFO: task kworker/1:48:3280 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: eb48a000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3281 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:84a4b000 r4:84a4b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c99a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f45d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edce5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d1f38c r4:85d1f000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d1f38c r4:848fbe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4b000 r8:848fbe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848fbe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848fbe00 r8:8027ed34 r7:dfd21e60 r6:8494bc80 r5:84a4b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495be00 INFO: task kworker/0:44:3281 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: eb8e7000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0465dc0 r4:00000000 r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3283 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd39d84 r8:00000002 r7:60000113 r6:dfd39d8c r5:84a4c800 r4:84a4c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c99d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f463000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd2d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d1ff8c r4:85d1fc00 r4:848fbe80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:84b6b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84b6b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be96c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3286 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfd49d84 r8:00000002 r7:60000113 r6:dfd49d8c r5:84a4d400 r4:84a4d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adb740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf75000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab1f8c r4:85ab1c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ab1f8c r4:8494bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4d400 r8:8494bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8494bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Exception stack(0xdfd49fb0 to 0xdfd49ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: eb98f000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2380 r4:00000000 r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b6b980 r8:8027ed34 r7:e045de60 r6:84b6ba00 r5:8486c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:50 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd51e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ecfa5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8494be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494be80 r8:8027ed34 r7:dfd49e60 r6:8494bf00 r5:84a4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd51fb0 to 0xdfd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84976b00 INFO: task kworker/1:50:3288 is blocked on a mutex likely owned by task kworker/1:107:3641. task:kworker/1:107 state:R running task stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8486c800 r8:80200be4 r7:e0465d54 r6:ffffffff r5:8486c800 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0465d20 to 0xe0465d68) 5d20: ebdd0000 eec83000 00000001 80239bb8 7f565000 00000001 82ac11c4 82ac05a0 5d40: 7f565000 eec83000 8280c9b4 e0465d9c e0465da0 e0465d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0465dc0 r5:e0465e08 r4:e0465d <> 00000 r5:eb9d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8496cb00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85620c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564cf8c r4:8564cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564cf8c r4:84260f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85620c00 r8:84260fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84260f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84260f80 r8:8027ed34 r7:eb9cde60 r6:84897900 r5:85620c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf5080 INFO: task kworker/0:595:5365 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a52e4000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:00001000 r4:dffc1000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:5366 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:8556e000 r4:8556e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8556e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8556e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb169000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564d38c r4:8564d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564d38c r4:848a5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556e000 r8:848a5fac r7:82804d40 r6:dddced40 r5:dddced60 r4:848a5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848a5f80 r8:8027ed34 r7:eb9d1e60 r6:84897980 r5:8556e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf5080 INFO: task kworker/0:596:5366 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e04f1dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf5080 INFO: task kworker/0:597:5367 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a56fd000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf52c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85628c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564d78c r4:8564d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564d78c r4:84bed080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628c00 r8:84bed0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed080 r8:8027ed34 r7:eb9d5e60 r6:84897b80 r5:85628c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf5080 INFO: task kworker/0:598:5368 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe04f1d20 to 0xe04f1d68) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:00000001 r4:84be2e00 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 r9:83018005 r8:85629800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r10:61c88647 r9:85629800 r8:84bed12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed100 r8:8027ed34 r7:eb9d5e60 r6:84897a80 r5:85629800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf5280 INFO: task kworker/0:599:5371 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a5eff000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 Not tainted 6.16.0-rc1-syzkaller #0 r4:8562b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb3bd000 r4:84897b00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:5376 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:8562bc00 r4:8562bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8562bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560078c r4:85600400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84897c80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04f1d20 to 0xe04f1d68) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8562c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84897d80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r5:00001000 r4:dffc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5381 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:8562d400 r4:8562d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8562d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8562d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb513000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564df8c r4:8564dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564df8c r4:84bed180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562d400 r8:84bed1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed180 r8:8027ed34 r7:eb9d5e60 r6:84897f00 r5:8562d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e9fb0 to 0xeb9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf5780 INFO: task kworker/0:600:5381 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a6df3000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:00000000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:8562e000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 Exception stack(0xeb9edfb0 to 0xeb9edff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:84b66400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8562ec00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560038c r4:85600000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560038c r4:84bef000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562ec00 r8:84bef02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bef000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef000 r8:8027ed34 r7:eb95de60 r6:84bef080 r5:8562ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a4880 INFO: task kworker/1:526:5383 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a6f78000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r4:00000000 r5:8501d38c r4:8501d000 1fa0: 00000000 00000000 00000000 00000000 r4:85630000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r9:83018205 r8:85630000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe04f1d20 to 0xe04f1d68) [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:00000001 INFO: task kworker/1:528:5389 blocked for more than 475 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850121c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b42f40 INFO: task kworker/1:528:5389 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a79a7000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:5390 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb9f1d84 r8:00000002 r7:60000013 r6:eb9f1d8c r5:85670000 r4:85670000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85670000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85670000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:00001000 r4:dffc1000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bed280 r8:8027ed34 r7:eb9d5e60 r6:84bed300 r5:85672400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf5900 INFO: task kworker/0:601:5391 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a7f6d000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:5393 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:5393 tgid:5393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba11d84 r8:00000002 r7:60000113 r6:eba11d8c r5:85673000 r4:85673000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85673000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850128c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85673000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564eb8c r4:8564e800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bed380 r8:8027ed34 r7:eb9d5e60 r6:84bed400 r5:85673000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:dffc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85601b8c r4:85601800 r10:61c88647 r9:85673c00 r8:84bef3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04f1d20 to 0xe04f1d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:5397 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba1dd84 r8:00000002 r7:60000013 r6:eba1dd8c r5:85674800 r4:85674800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85674800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85674800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6df000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560178c r4:85601400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560178c r4:84bef400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85674800 r8:84bef42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bef400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef400 r8:8027ed34 r7:eba19e60 r6:84bed500 r5:85674800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85012180 INFO: task kworker/1:531:5397 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a85f3000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dffc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba21e08 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85675400 r8:84bef4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 800b0013 ffffffff r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012bc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85676000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85602b8c r4:85602800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85602b8c r4:84bef500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85676000 r8:84bef52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bef500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef500 r8:8027ed34 r7:eba21e60 r6:84bed600 r5:85676000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85012640 INFO: task kworker/1:533:5402 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) r4:82ac11e4 r4:00000000 r5:00001000 r4:dffc1000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb71d000 r10:00000000 r9:84bef580 r8:8027ed34 r7:eba25e60 r6:84bed680 r5:85676c00 r4:00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:5406 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:5406 tgid:5406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba05d84 r8:00000002 r7:60000113 r6:eba05d8c r5:85671800 r4:85671800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85671800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012b00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85671800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8560278c r4:85602400 r10:00000000 r9:84bef600 r8:8027ed34 r7:eba25e60 r6:84bed780 r5:85671800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dffc1000 r5:8501d38c r4:8501d000 r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:84be2e00 task:kworker/0:603 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564ef8c r4:8564ec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564ef8c r4:84bed800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85670c00 r8:84bed82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed800 r8:8027ed34 r7:eba11e60 r6:84bed880 r5:85670c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba39fb0 to 0xeba39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c7800 INFO: task kworker/0:603:5407 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r4:00000000 r4:00000000 r7:dddced40 r6:83018000 r5:85660f8c r4:84bed900 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba4dd84 r8:00000002 r7:60000113 r6:eba4dd8c r5:85680c00 r4:85680c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85680c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfad40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85680c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564f78c r4:8564f400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564f78c r4:84beda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85680c00 r8:84beda2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84beda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84beda00 r8:8027ed34 r7:eba3de60 r6:84beda80 r5:85680c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba4dfb0 to 0xeba4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfa0c0 INFO: task kworker/0:605:5410 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: a9e86000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r4:e04f1dc0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b66400 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012d40 r5:85602f8c r4:85602c00 r10:00000000 r9:84bef680 r8:8027ed34 r7:eba25e60 r6:84bedb00 r5:85681800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84b66400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:5416 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:85683c00 r4:85683c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85683c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85683c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85603b8c r4:85603800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85603b8c r4:84bef700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85683c00 r8:84bef72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bef700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef700 r8:8027ed34 r7:eb859e60 r6:84bedb80 r5:85683c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85012d00 INFO: task kworker/1:537:5416 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04f1fb0 to 0xe04f1ff8) Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb8b9d84 r8:00000002 r7:60000113 r6:eb8b9d8c r5:85682400 r4:85682400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85682400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012e80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85682400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560338c r4:85603000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560338c r4:84bef780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85682400 r8:84bef7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bef780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef780 r8:8027ed34 r7:eb8b5e60 r6:84bedc00 r5:85682400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b9fb0 to 0xeb8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85012d00 INFO: task kworker/1:538:5417 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: aa633000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dffc1000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:eb961d84 r8:00000002 r7:60000113 r6:eb961d8c r5:85684800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012fc0 r5:8560378c r4:85603400 r4:84bef800 Exception stack(0xeb961fb0 to 0xeb961ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:85683000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3280 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85683000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560438c r4:85604000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560438c r4:84bef880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85683000 r8:84bef8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bef880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef880 r8:8027ed34 r7:eb8b5e60 r6:84bedd00 r5:85683000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be3000 INFO: task kworker/1:540:5423 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: aaa18000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:5424 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918644 r9:eba59d84 r8:00000002 r7:60000113 r6:eba59d8c r5:85686c00 r4:85686c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85686c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3200 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bef900 Exception stack(0xeba59fb0 to 0xeba59ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:eba65d84 r8:00000002 r7:60000013 r6:eba65d8c r5:85689800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba65e08 r9:83018205 r8:85689800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r4:84bef980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:5429 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:5429 tgid:5429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba6dd84 r8:00000002 r7:60000013 r6:eba6dd8c r5:8568a400 r4:8568a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8568a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8568a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85604b8c r4:85604800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dffc1000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:544 state:D stack:0 pid:5431 tgid:5431 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3980 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85688c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560538c r4:85605000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560538c r4:84befa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85688c00 r8:84befaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84befa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befa80 r8:8027ed34 r7:eba6de60 r6:84bedf00 r5:85688c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be3480 INFO: task kworker/1:544:5431 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: ab72e000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb5cb000 r4:84befb00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 800b0013 ffffffff [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:5434 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:5434 tgid:5434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:85634800 r4:85634800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85634800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa740 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85634800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb617000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564fb8c r4:8564f800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564fb8c r4:84b4f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85634800 r8:84b4f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4f000 r8:8027ed34 r7:eba3de60 r6:84befc00 r5:85634800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba75fb0 to 0xeba75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfacc0 INFO: task kworker/0:606:5434 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 INFO: task kworker/1:546:5437 blocked for more than 476 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3d00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85630c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560578c r4:85605400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560578c r4:84befc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85630c00 r8:84befcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84befc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befc80 r8:8027ed34 r7:eba71e60 r6:84befd00 r5:85630c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8501d38c r4:8501d000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec285e08 r5:8564ff8c r4:8564fc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:85636c00 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:84befe00 r8:8027ed34 r7:eba79e60 r6:84befe80 r5:85636c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be3cc0 INFO: task kworker/1:547:5440 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: acb1e000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec28de08 r4:84b51000 INFO: task kworker/1:548:5443 is blocked on a mutex likely owned by task kworker/0:169:3659. r5:00001000 r4:dffc1000 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:5445 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:5445 tgid:5445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec295d84 r8:00000002 r7:60000113 r6:ec295d8c r5:8556bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec295e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r9:83018205 r8:8568b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r10:00000000 r9:84b51100 r8:8027ed34 r7:ec28de60 r6:84b4f200 r5:8568b000 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:5449 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:5449 tgid:5449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eba51d84 r8:00000002 r7:60000013 r6:eba51d8c r5:8568bc00 r4:8568bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8568bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54240 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8568bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560638c r4:85606000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560638c r4:84b51180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8568bc00 r8:84b511ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b51180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b51180 r8:8027ed34 r7:ec28de60 r6:84b4f280 r5:8568bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b54200 INFO: task kworker/1:550:5449 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d20: acf86000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:8560738c r4:85607000 r10:00000000 r9:84b51200 r8:8027ed34 r7:ec28de60 r6:84b4f300 r5:8568c800 INFO: task kworker/1:551:5451 is blocked on a mutex likely owned by task kworker/0:169:3659. 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:5453 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec29dd84 r8:00000002 r7:60000113 r6:ec29dd8c r5:8568d400 r4:8568d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8568d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec29de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b544c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8568d400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85606b8c r4:85606800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85606b8c r4:84b51280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8568d400 r8:84b512ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b51280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b51280 r8:8027ed34 r7:ec299e60 r6:84b4f380 r5:8568d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec29dfb0 to 0xec29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:800b0013 r4:80239bd0 r4:00000000 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84be2e00 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2a1e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8568e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8eb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85606f8c r4:85606c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85606f8c r4:84b51300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8568e000 r8:84b5132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b51300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b51300 r8:8027ed34 r7:ec299e60 r6:84b4f400 r5:8568e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:5458 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2b5e08 r4:00000000 r10:61c88647 r9:8568ec00 r8:84b513ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2b9e08 r4:84b51400 r4:84b54740 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2bde08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54dc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85686000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb941000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a478c r4:856a4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a478c r4:84b51480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85686000 r8:84b514ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b51480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b51480 r8:8027ed34 r7:ec2b9e60 r6:84b4f580 r5:85686000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2bdfb0 to 0xec2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b54740 INFO: task kworker/1:556:5460 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:557:5462 blocked for more than 476 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2c1e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:5464 blocked for more than 476 seconds. r5:85690c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2c9e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: r4:e04f1dc0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:559:5466 blocked for more than 476 seconds. r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: aecc3000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2d5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b49040 Exception stack(0xec2d5fb0 to 0xec2d5ff8) r4:00000000 r4:00000000 r5:8501d38c r4:8501d000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2cde08 r5:00001000 r4:eb99d000 r10:00000000 r9:84b51700 r8:8027ed34 r7:ec2d5e60 r6:84b4f800 r5:85693000 Call trace: 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:5473 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:5473 tgid:5473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec2d9d84 r8:00000002 r7:60000113 r6:ec2d9d8c r5:85693c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2d9e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:84be2e00 r4:85694800 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb985000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a538c r4:856a5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a538c r4:84b51780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85694800 r8:84b517ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b51780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b51780 r8:8027ed34 r7:ec2cde60 r6:84b4f980 r5:85694800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2ddfb0 to 0xec2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b491c0 INFO: task kworker/1:562:5475 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:84b66400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918644 r9:ec2e1d84 r8:00000002 r7:60000113 r6:ec2e1d8c r5:85695400 r4:85695400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85695400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85324f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85695400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b51800 r8:8027ed34 r7:ec2cde60 r6:84b4fa00 r5:85695400 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e04f1dc0 r4:00000000 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:5480 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b49580 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85696c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:856a5f8c r4:856a5c00 Exception stack(0xec2e5fb0 to 0xec2e5ff8) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:84be2e00 r5:85696000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r5:85660b8c r4:85660800 r10:00000000 r9:84b4fb00 r8:8027ed34 r7:eba3de60 r6:84b4fb80 r5:85696000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b53f80 INFO: task kworker/0:610:5484 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: affd4000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:611 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:00000000 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:5487 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b49780 Exception stack(0xe04f1d20 to 0xe04f1d68) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847f1800 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b49780 INFO: task kworker/1:566:5488 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b06c8000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:5490 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec2e9d84 r8:00000002 r7:60000113 r6:ec2e9d8c r5:847f2400 r4:847f2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85324a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb057000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a678c r4:856a6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a678c r4:84b51a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f2400 r8:84b51a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b51a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b51a00 r8:8027ed34 r7:ec2a5e60 r6:84b4fe00 r5:847f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2e9fb0 to 0xec2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b49780 INFO: task kworker/1:567:5490 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b0ae8000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:5492 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:5492 tgid:5492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec2f1d84 r8:00000002 r7:60000013 r6:ec2f1d8c r5:85635400 r4:85635400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85635400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495a640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85635400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb455000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85661b8c r4:85661800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85661b8c r4:84b4fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85635400 r8:84b4feac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4fe80 r10:00000000 r9:84b4fe80 r8:8027ed34 r7:eb9ade60 r6:84b51a80 r5:85635400 1fa0: 00000000 00000000 00000000 00000000 r4:8495a340 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b0ae8000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:5493 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:5493 tgid:5493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec2f5d84 r8:00000002 r7:60000113 r6:ec2f5d8c r5:85691800 r4:85691800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85691800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495a500 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85691800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566178c r4:85661400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566178c r4:84bedf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85691800 r8:84bedfac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bedf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedf80 r8:8027ed34 r7:ec2f1e60 r6:84b51b00 r5:85691800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2f5fb0 to 0xec2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495a340 INFO: task kworker/0:613:5493 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b1136000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:614 state:D stack:0 pid:5496 tgid:5496 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec301e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85663b8c r4:84bed700 Exception stack(0xec301fb0 to 0xec301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495a580 INFO: task kworker/0:614:5496 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b1136000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec309d84 r8:00000002 r7:60000013 r6:ec309d8c r5:849d8c00 r4:849d8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec309e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495a6c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b4ff00 r8:8027ed34 r7:ec301e60 r6:84b51c00 r5:849d8c00 r4:8495a580 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:5499 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec30dd84 r8:00000002 r7:60000113 r6:ec30dd8c r5:849d9800 r4:849d9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849d9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec30de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495a8c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566238c r4:85662000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566238c r4:84b50000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d9800 r8:84b5002c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50000 r8:8027ed34 r7:ec301e60 r6:84b51c80 r5:849d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec30dfb0 to 0xec30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495a700 INFO: task kworker/0:616:5499 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b1bde000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:617:5501 blocked for more than 477 seconds. Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec315e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495aa00 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566278c r4:85662400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566278c r4:84b50080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849db000 r8:84b500ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50080 r8:8027ed34 r7:ec301e60 r6:84b51d00 r5:849db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec315fb0 to 0xec315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495a880 INFO: task kworker/0:617:5501 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b1bde000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:5503 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:5503 tgid:5503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec31dd84 r8:00000002 r7:60000113 r6:ec31dd8c r5:849da400 r4:849da400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849da400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec31de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8495aa80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849da400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb527000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85662b8c r4:85662800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85662b8c r4:84b50100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849da400 r8:84b5012c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50100 r8:8027ed34 r7:ec301e60 r6:84b51d80 r5:849da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec31dfb0 to 0xec31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495ac00 INFO: task kworker/0:618:5503 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b20a8000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec329e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb6a7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8495aac0 Workqueue: events bpf_prog_free_deferred 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) r4:84be2e00 task:kworker/0:620 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec32de08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50200 r8:8027ed34 r7:ec301e60 r6:84b51e80 r5:849dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec32dfb0 to 0xec32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8495ac40 INFO: task kworker/0:620:5507 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b26dc000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:5509 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:5509 tgid:5509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec335d84 r8:00000002 r7:60000013 r6:ec335d8c r5:849dc800 r4:849dc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849dc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec335e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f9f80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8566378c r4:84b50280 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:622:5512 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:622 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec341d84 r8:00000002 r7:60000013 r6:ec341d8c r5:849dbc00 r4:849dbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec341e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b50300 r8:8027ed34 r7:ec301e60 r6:84b51f80 r5:849dbc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:623:5513 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:623 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec345d84 r8:00000002 r7:60000113 r6:ec345d8c r5:849de000 r4:849de000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849de000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec345e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a6180 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849de000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb725000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85663f8c r4:85663c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85663f8c r4:84b50400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849de000 r8:84b5042c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50400 r8:8027ed34 r7:ec341e60 r6:84beff00 r5:849de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec345fb0 to 0xec345ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:e04f1dc0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:849dec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec351e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:845e5b8c r4:845e5800 r10:00000000 r9:84b50380 r8:8027ed34 r7:ec341e60 r6:84beff80 r5:849dec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec351fb0 to 0xec351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a63c0 INFO: task kworker/0:624:5515 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b30f5000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:85638c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec359e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb7c3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:626 state:D stack:0 pid:5519 tgid:5519 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec361e08 r4:00000000 r5:856dc78c r4:856dc400 r10:00000000 r9:84b50500 r8:8027ed34 r7:ec341e60 r6:85205080 r5:85638000 r4:851a6500 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b361f000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:5521 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec37dd84 r8:00000002 r7:60000113 r6:ec37dd8c r5:8563bc00 r4:8563bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec37de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a6640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8563bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:00000000 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:628:5523 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:628 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8563a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec381e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb9c1000 r4:84b50600 Exception stack(0xec381fb0 to 0xec381ff8) r4:851a6680 Call trace: 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:629 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec389e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856de38c r4:856de000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856de38c r4:84b50680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563b000 r8:84b506ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50680 r8:8027ed34 r7:ec341e60 r6:85205200 r5:8563b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec389fb0 to 0xec389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a6740 INFO: task kworker/0:629:5525 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b3cc7000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:630 state:D stack:0 pid:5527 tgid:5527 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec391e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:631 state:D stack:0 pid:5529 tgid:5529 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec399e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a6c40 r7:dddced40 r6:83018000 r5:856ddb8c r4:84b50780 Exception stack(0xec399fb0 to 0xec399ff8) r4:851a6a80 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b3e52000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:5531 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec3a9d84 r8:00000002 r7:60000113 r6:ec3a9d8c r5:8563d400 r4:8563d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3a9e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b50800 r8:8027ed34 r7:ec389e60 r6:85205380 r5:8563d400 r4:851a6a80 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:633 state:D stack:0 pid:5533 tgid:5533 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3d1e08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec3d1fb0 to 0xec3d1ff8) r4:851a6cc0 Call trace: 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:634:5535 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:634 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec3d9d84 r8:00000002 r7:60000113 r6:ec3d9d8c r5:85639800 r4:85639800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85639800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012f00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85639800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3db000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856de78c r4:856de400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856de78c r4:84b50900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85639800 r8:84b5092c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50900 r8:8027ed34 r7:ec3d1e60 r6:85205480 r5:85639800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3d9fb0 to 0xec3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:5537 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:635 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54cc0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85640c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856deb8c r4:856de800 r10:00000000 r9:84b50980 r8:8027ed34 r7:ec3d1e60 r6:85205500 r5:85640c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3f9e08 r7:dddced40 r6:83018000 r5:856def8c r4:84b50a00 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:5541 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:5541 tgid:5541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec409d84 r8:00000002 r7:60000013 r6:ec409d8c r5:85641800 r4:85641800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85641800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec409e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527b0c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85641800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3fd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856df38c r4:856df000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856df38c r4:84b50a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85641800 r8:84b50aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50a80 r8:8027ed34 r7:ec3d1e60 r6:85205600 r5:85641800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec409fb0 to 0xec409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d20 to 0xe04f1d68) r4:82ac11e4 r4:e04f1dc0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b66400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84be2e00 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ec41dd84 r8:00000002 r7:60000113 r6:ec41dd8c r5:85642400 r4:85642400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85642400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec41de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527b2c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85642400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec415000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856dfb8c r4:856df800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856dfb8c r4:84b50b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85642400 r8:84b50b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50b00 r8:8027ed34 r7:ec3d1e60 r6:85205680 r5:85642400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec41dfb0 to 0xec41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8527b280 INFO: task kworker/0:638:5544 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b5733000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:e04f1dc0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85644800 r4:82918640 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85644800 r8:84b50bac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85643c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec467000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85718f8c r4:85718c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85718f8c r4:84b50c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85643c00 r8:84b50cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50c80 r8:8027ed34 r7:ec429e60 r6:85205780 r5:85643c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec435fb0 to 0xec435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8527b480 INFO: task kworker/0:640:5547 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b5f57000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec445e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85646000 r8:84b50c2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:84b66400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec459e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xec459fb0 to 0xec459ff8) task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:5553 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec465d84 r8:00000002 r7:60000113 r6:ec465d8c r5:85643000 r4:85643000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec465e08 r4:00000000 r5:85718b8c r4:85718800 r10:00000000 r9:84b50d00 r8:8027ed34 r7:ec435e60 r6:85205900 r5:85643000 r4:8527b900 r4:00000000 r4:e04f1dc0 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:dddced40 r6:83018000 r5:85719f8c r4:84b50e00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:645:5558 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:5558 tgid:5558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec485d84 r8:00000002 r7:60000113 r6:ec485d8c r5:85750000 r4:85750000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85750000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec485e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527bac0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85750000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec46d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571938c r4:85719000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571938c r4:84b50e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85750000 r8:84b50eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b50e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b50e80 r8:8027ed34 r7:ec479e60 r6:85205a00 r5:85750000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec485fb0 to 0xec485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8527ba00 INFO: task kworker/0:645:5558 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec4b5fb0 to 0xec4b5ff8) task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b79ad000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:5561 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec385d84 r8:00000002 r7:60000113 r6:ec385d8c r5:847f3c00 r4:847f3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec385e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527bd40 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85304000 r8:8027ed34 r7:ec479e60 r6:85304080 r5:847f3c00 r4:8527bb80 Workqueue: events bpf_prog_free_deferred 1d60: 800b0013 ffffffff r4:00000000 r5:00001000 r4:dffc1000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:847f5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4cf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571a78c r4:8571a400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571a78c r4:85304100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f5400 r8:8530412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85304100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85304100 r8:8027ed34 r7:ec479e60 r6:85304180 r5:847f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b9fb0 to 0xec4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8527bdc0 INFO: task kworker/0:648:5564 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b7ed4000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dffc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:82918644 r9:ec2edd84 r8:00000002 r7:60000013 r6:ec2edd8c r5:847f6000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2ede08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dffc1000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847f6c00 r8:8530432c r7:82804d40 r6:dddced40 r5:dddced60 r4:85304300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85304300 r8:8027ed34 r7:ec4b9e60 r6:85304380 r5:847f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4c5fb0 to 0xec4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85421080 INFO: task kworker/0:650:5568 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b84bd000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:5569 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4cde08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8571ab8c r4:8571a800 r10:00000000 r9:85304400 r8:8027ed34 r7:ec4c5e60 r6:85304480 r5:847f4800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:5572 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec4d9d84 r8:00000002 r7:60000113 r6:ec4d9d8c r5:847f3000 r4:847f3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4e9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571b38c r4:8571b000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571b38c r4:85304500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f3000 r8:8530452c r7:82804d40 r6:dddced40 r5:dddced60 r4:85304500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85304500 r8:8027ed34 r7:ec4c5e60 r6:85304580 r5:847f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:653 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4e1e08 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85304600 r8:8027ed34 r7:ec4d9e60 r6:85304680 r5:84288000 r4:85421380 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b8cd3000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:5578 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:5578 tgid:5578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec509d84 r8:00000002 r7:60000113 r6:ec509d8c r5:85752400 r4:85752400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85752400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec509e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421700 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85752400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571bb8c r4:8571b800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571bb8c r4:85304700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:e04f1dc0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:5579 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec50dd84 r8:00000002 r7:60000113 r6:ec50dd8c r5:85751800 r4:85751800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85751800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec50de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85751800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e470f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571bf8c r4:8571bc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571bf8c r4:85304780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85751800 r8:853047ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85304780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85304780 r8:8027ed34 r7:ec509e60 r6:85205b80 r5:85751800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec50dfb0 to 0xec50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r5:00001000 r4:dffc1000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4ede08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:dffc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec4f5d84 r8:00000002 r7:60000013 r6:ec4f5d8c r5:84289800 r4:84289800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84289800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69380 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84289800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb203000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572178c r4:85721400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572178c r4:85304900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84289800 r8:8530492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85304900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85304900 r8:8027ed34 r7:ec4ede60 r6:85304980 r5:84289800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f5fb0 to 0xec4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85421880 INFO: task kworker/0:657:5581 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b988d000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:8428a400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85324840 r5:856a6b8c r4:856a6800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:569 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec521e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853242c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428c800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb555000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6f8c r4:856a6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a6f8c r4:85205c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428c800 r8:85205cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85205c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85205c80 r8:8027ed34 r7:ec2a5e60 r6:85304a80 r5:8428c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec521fb0 to 0xec521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85324600 INFO: task kworker/1:569:5587 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: b9e5e000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:5588 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec525fb0 to 0xec525ff8) task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: ba321000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:571 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:e04f1dc0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:ec52dd84 r8:00000002 r7:60000113 r6:ec52dd8c r5:85754800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec52de08 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:00001000 r4:dffc1000 r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:5596 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:5596 tgid:5596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec531d84 r8:00000002 r7:60000013 r6:ec531d8c r5:85755400 r4:85755400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85755400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec531e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85755400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b838c r4:856b8000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b838c r4:85419000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85755400 r8:8541902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419000 r8:8027ed34 r7:ec52de60 r6:85419080 r5:85755400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec531fb0 to 0xec531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300180 INFO: task kworker/1:573:5596 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bac3d000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:574 state:D stack:0 pid:5597 tgid:5597 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85300240 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:5599 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec539d84 r8:00000002 r7:60000013 r6:ec539d8c r5:85756c00 r4:85756c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85756c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec539e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300680 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85756c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b8b8c r4:856b8800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b8b8c r4:85419200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85756c00 r8:8541922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419200 r8:8027ed34 r7:ec535e60 r6:85419280 r5:85756c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec539fb0 to 0xec539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853004c0 INFO: task kworker/1:575:5599 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bac3d000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:576 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec545e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb90b000 r10:61c88647 r9:8428e000 r8:8541932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:5603 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec549d84 r8:00000002 r7:60000013 r6:ec549d8c r5:8428ec00 r4:8428ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec549e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853007c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b8f8c r4:856b8c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b8f8c r4:85419380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428ec00 r8:854193ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419380 r8:8027ed34 r7:ec545e60 r6:85304c00 r5:8428ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec549fb0 to 0xec549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r5:00001000 r4:dffc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:5605 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec53dd84 r8:00000002 r7:60000113 r6:ec53dd8c r5:8428d400 r4:8428d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec53de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300a40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b938c r4:856b9000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b938c r4:85419400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428d400 r8:8541942c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419400 r8:8027ed34 r7:ec545e60 r6:85304c80 r5:8428d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec53dfb0 to 0xec53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300940 INFO: task kworker/1:578:5605 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bb813000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec54de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85304d00 r8:8027ed34 r7:ec4f5e60 r6:85304d80 r5:8428bc00 r4:8541e200 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bb813000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:5609 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:5609 tgid:5609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ec551d84 r8:00000002 r7:60000113 r6:ec551d8c r5:84938000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec551e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec551fb0 to 0xec551ff8) r4:85300b00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04f1d20 to 0xe04f1d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:580 state:D stack:0 pid:5611 tgid:5611 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec541e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300cc0 r7:ddde2d40 r6:83018200 r5:856b9f8c r4:85419500 Exception stack(0xec541fb0 to 0xec541ff8) r4:85300c00 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bb813000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:5612 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:5612 tgid:5612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec555d84 r8:00000002 r7:60000113 r6:ec555d8c r5:8575a400 r4:8575a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8575a400 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec555e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856ba38c r4:856ba000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:8575bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ba78c r4:856ba400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ba78c r4:85419700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575bc00 r8:8541972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419700 r8:8027ed34 r7:ec555e60 r6:85419780 r5:8575bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec559fb0 to 0xec559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300f40 INFO: task kworker/1:582:5615 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bbfc2000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:ec511d84 r8:00000002 r7:60000113 r6:ec511d8c r5:85759800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321000 r5:856bab8c r4:856ba800 r4:85419800 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dffc1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:584 state:D stack:0 pid:5619 tgid:5619 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec55de08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8575c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb977000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856baf8c r4:856bac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856baf8c r4:85419900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575c800 r8:8541992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419900 r8:8027ed34 r7:ec511e60 r6:85419980 r5:8575c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec55dfb0 to 0xec55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853210c0 INFO: task kworker/1:584:5619 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bc3db000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:5622 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:8575d400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec561e08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85419a00 r8:8027ed34 r7:ec55de60 r6:85419a80 r5:8575d400 r4:85321200 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:e04f1dc0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:5623 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec565d84 r8:00000002 r7:60000113 r6:ec565d8c r5:8575e000 r4:8575e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8575e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec565e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321540 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8575e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba07000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bb78c r4:856bb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bb78c r4:85419b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575e000 r8:85419b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419b00 r8:8027ed34 r7:ec561e60 r6:85419b80 r5:8575e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec565fb0 to 0xec565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853212c0 INFO: task kworker/1:586:5623 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bc889000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8575ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bbb8c r4:856bb800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bbb8c r4:85419c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575ec00 r8:85419cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800b0013 r4:80239bd0 r4:00000000 r5:00001000 r4:dffc1000 r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec56dd84 r8:00000002 r7:60000013 r6:ec56dd8c r5:8575b000 r4:8575b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8575b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec56de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321840 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8575b000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bbf8c r4:856bbc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bbf8c r4:85419c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575b000 r8:85419c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:5629 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec571d84 r8:00000002 r7:60000113 r6:ec571d8c r5:85758000 r4:85758000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec571e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:5632 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec575d84 r8:00000002 r7:60000113 r6:ec575d8c r5:85753c00 r4:85753c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85753c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec575e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321a80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85753c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2a9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c478c r4:856c4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c478c r4:85419f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85753c00 r8:85419f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85419f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419f00 r8:8027ed34 r7:ec571e60 r6:85419f80 r5:85753c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec575fb0 to 0xec575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853219c0 INFO: task kworker/1:590:5632 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r4:e04f1dc0 r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:591:5633 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ec579d84 r8:00000002 r7:60000113 r6:ec579d8c r5:85631800 r5:85631800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec579e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321c80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85631800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4fd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c4b8c r4:856c4800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c4b8c r4:85291000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85631800 r8:8529102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291000 r8:8027ed34 r7:ec575e60 r6:85291080 r5:85631800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec579fb0 to 0xec579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85321ac0 INFO: task kworker/1:591:5633 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bd7cd000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8501d38c r4:8501d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:592 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85760c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec585e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856c4f8c r4:856c4c00 r7:ddde2d40 r6:83018200 r5:856c4f8c r4:85291100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85760c00 r8:8529112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291100 r8:8027ed34 r7:ec579e60 r6:85291180 r5:85760c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec585fb0 to 0xec585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85321e80 INFO: task kworker/1:592:5636 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bdcfe000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:5637 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec591d84 r8:00000002 r7:60000113 r6:ec591d8c r5:85761800 r4:85761800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85761800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec591e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a000 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85761800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec58d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c538c r4:856c5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c538c r4:85291200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85761800 r8:8529122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291200 r8:8027ed34 r7:ec585e60 r6:85291280 r5:85761800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec591fb0 to 0xec591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85321e80 INFO: task kworker/1:593:5637 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:594:5640 blocked for more than 478 seconds. task:kworker/1:594 state:D stack:0 pid:5640 tgid:5640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec57dd84 r8:00000002 r7:60000013 r6:ec57dd8c r5:85762400 r4:85762400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85762400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec57de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85762400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c578c r4:856c5400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c578c r4:85291300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85762400 r8:8529132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291300 r8:8027ed34 r7:ec591e60 r6:85291380 r5:85762400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec57dfb0 to 0xec57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a240 INFO: task kworker/1:594:5640 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bdeaf000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b66400 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:595:5641 blocked for more than 478 seconds. r5:85763000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85763000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c5b8c r4:856c5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c5b8c r4:85291400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85763000 r8:8529142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291400 r8:8027ed34 r7:ec57de60 r6:85291480 r5:85763000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a5fb0 to 0xec5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a080 INFO: task kworker/1:595:5641 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: be51e000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:5643 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:5643 tgid:5643 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918644 r9:ec599d84 r8:00000002 r7:60000113 r6:ec599d8c r5:85763c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec599e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5af000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c5f8c r4:856c5c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c5f8c r4:85291500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85763c00 r8:8529152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291500 r8:8027ed34 r7:ec5a5e60 r6:85291580 r5:85763c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a900 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85764800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c6b8c r4:856c6800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c6b8c r4:85291600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85764800 r8:8529162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291600 r8:8027ed34 r7:ec599e60 r6:85291680 r5:85764800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5adfb0 to 0xec5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a440 INFO: task kworker/1:597:5646 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: beb93000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85291700 r8:8027ed34 r7:ec5ade60 r6:85291780 r5:85765400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a5c0 INFO: task kworker/1:598:5647 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: beb93000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:599:5649 blocked for more than 478 seconds. r10:82918644 r9:ec5c1d84 r8:00000002 r7:60000013 r6:ec5c1d8c r5:85766000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a7c0 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85766000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c678c r4:856c6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c678c r4:85291800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766000 r8:8529182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291800 r8:8027ed34 r7:ec5ade60 r6:85291880 r5:85766000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528a780 INFO: task kworker/1:599:5649 is blocked on a mutex likely owned by task kworker/0:169:3659. Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:84b66400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85766c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528aa80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8493bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c6f8c r4:856c6c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c6f8c r4:85291a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493bc00 r8:85291a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291a00 r8:8027ed34 r7:ec5d5e60 r6:85304e80 r5:8493bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe04f1fb0 to 0xe04f1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r9:83018205 r8:8493b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 1fa0: 00000000 00000000 00000000 00000000 1d20: bfac5000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:5657 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:84939800 r4:84939800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528aec0 r10:00000000 r9:85291b00 r8:8027ed34 r7:ec5d5e60 r6:85304f80 r5:84939800 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bfac5000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85760000 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ed00 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85760000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c7f8c r4:856c7c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c7f8c r4:85291b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85760000 r8:85291bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291b80 r8:8027ed34 r7:ec601e60 r6:85291c00 r5:85760000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e1fb0 to 0xec5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8528abc0 INFO: task kworker/1:604:5658 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5a400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85768000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec625000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ccb8c r4:856cc800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ccb8c r4:85291c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85768000 r8:85291cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5fdfb0 to 0xec5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5a080 INFO: task kworker/1:605:5661 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 1d60: 800b0013 ffffffff r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85768c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:856cc38c r4:85291d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85768c00 r8:85291dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291d80 r8:8027ed34 r7:ec5fde60 r6:85291e00 r5:85768c00 r4:00000001 Exception stack(0xec5cdfb0 to 0xec5cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:e04f1dc0 r5:00001000 r4:dffc1000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec61de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5a240 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8576a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec61f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cc78c r4:856cc400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cc78c r4:85291e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576a400 r8:85291eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85291e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85291e80 r8:8027ed34 r7:ec5fde60 r6:85291f00 r5:8576a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec61dfb0 to 0xec61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5a200 INFO: task kworker/1:607:5665 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: bff6f000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918644 r9:ec62dd84 r8:00000002 r7:60000113 r6:ec62dd8c r5:85769800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5a640 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85769800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec62f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ccf8c r4:856ccc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ccf8c r4:85291f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85769800 r8:85291fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85291f80 r8:8027ed34 r7:ec5fde60 r6:85205f80 r5:85769800 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:84b66400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/1:609:5669 blocked for more than 478 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 r7:ddde2d40 r6:83018200 r5:856cd38c r4:84b67000 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe04f1d20 to 0xe04f1d68) r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:5672 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:5672 tgid:5672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec615d84 r8:00000002 r7:60000113 r6:ec615d8c r5:8493c800 r4:8493c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69800 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85720b8c r4:84b45000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 r5:8501d38c r4:8501d000 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/1:610:5673 blocked for more than 478 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:ddde2d40 r6:83018200 r5:856cd78c r4:84b67280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493e000 r8:84b672ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b67280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67280 r8:8027ed34 r7:ec639e60 r6:84b45100 r5:8493e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5a800 INFO: task kworker/1:610:5673 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c0e18000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8493ec00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec655e08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:856cdb8c r4:84b67100 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:800b0013 r4:80239bd0 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:5678 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:5678 tgid:5678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec669d84 r8:00000002 r7:60000013 r6:ec669d8c r5:8493a400 r4:8493a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec669e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69b40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8572138c r4:84b45200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d20: c15cb000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r5:00001000 r4:ec66f000 r4:84b67180 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5ac00 INFO: task kworker/1:612:5679 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c15cb000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84be2e00 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ae80 r10:00000000 r9:84b67200 r8:8027ed34 r7:ec66de60 r6:84b45380 r5:84748c00 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84be2e00 task:kworker/1:614 state:D stack:0 pid:5683 tgid:5683 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r4:84b67300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67300 r8:8027ed34 r7:ec681e60 r6:84b45400 r5:8474a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5a740 INFO: task kworker/1:614:5683 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c15cb000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec695e08 r4:00000000 r5:856cff8c r4:856cfc00 r10:61c88647 r9:84748000 r8:84b673ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84b67380 r8:8027ed34 r7:ec691e60 r6:84b45480 r5:84748000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec695fb0 to 0xec695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5a740 INFO: task kworker/1:615:5685 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c1c59000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918644 r9:ec661d84 r8:00000002 r7:60000113 r6:ec661d8c r5:8576b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r4:84be2e00 task:kworker/1:617 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d2b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8576d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec311000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cef8c r4:856cec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cef8c r4:84b67500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576d400 r8:84b6752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b67500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67500 r8:8027ed34 r7:ec695e60 r6:84b67580 r5:8576d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d2080 INFO: task kworker/1:617:5689 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c1e46000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501d38c r4:8501d000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8576e000 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2f9e08 r7:dddced40 r6:83018000 r5:85721b8c r4:84b45500 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 800b0013 ffffffff [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:5693 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec319d84 r8:00000002 r7:60000113 r6:ec319d8c r5:8576ec00 r4:8576ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8576ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec319e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b69400 1d20: c25b3000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec33de08 r9:83018005 r8:85770c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r7:dddced40 r6:83018000 r5:8572338c r4:84b45600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85770c00 r8:84b4562c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b45600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b45600 r8:8027ed34 r7:ec319e60 r6:84b67700 r5:85770c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec33dfb0 to 0xec33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84960080 INFO: task kworker/0:663:5696 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c2874000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:8501d38c r4:8501d000 r4:84b66400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec365e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84960180 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85772400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572238c r4:85722000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572238c r4:84b45680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85772400 r8:84b456ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b45680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b45680 r8:8027ed34 r7:ec33de60 r6:84b67780 r5:85772400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec365fb0 to 0xec365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84960140 INFO: task kworker/0:664:5698 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c2874000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r4:84be2e00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85770000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84960140 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85770000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 r5:8572278c r4:85722400 r4:84b45700 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918644 r9:ec3e5d84 r8:00000002 r7:60000013 r6:ec3e5d8c r5:85773c00 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85722b8c r4:85722800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85722b8c r4:84b45780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85773c00 r8:84b457ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b45780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b45780 r8:8027ed34 r7:ec33de60 r6:84b67880 r5:85773c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3e5fb0 to 0xec3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849602c0 INFO: task kworker/0:666:5701 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c2de9000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 task:kworker/0:667 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84960580 r7:dddced40 r6:83018000 r5:85722f8c r4:84b45800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84960380 INFO: task kworker/0:667:5703 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c32af000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:00000000 r5:8501d38c r4:8501d000 Exception stack(0xe04f1fb0 to 0xe04f1ff8) task:kworker/0:668 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3f1e08 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 Exception stack(0xe04f1fb0 to 0xe04f1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r7:dddced40 r6:83018000 r5:8572378c r4:84b45a00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec401fb0 to 0xec401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84960940 INFO: task kworker/0:669:5708 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c344d000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:670:5709 blocked for more than 478 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec40de08 r4:00000000 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb9bf000 r10:00000000 r9:84b45b00 r8:8027ed34 r7:ec3f1e60 r6:84b45b80 r5:8474d400 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:671:5712 blocked for more than 479 seconds. r10:82918644 r9:ec419d84 r8:00000002 r7:60000113 r6:ec419d8c r5:8474e000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84960b80 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8474e000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85723f8c r4:85723c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85723f8c r4:84b45c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474e000 r8:84b45c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b45c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b45c00 r8:8027ed34 r7:ec40de60 r6:84b45c80 r5:8474e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec419fb0 to 0xec419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84960b40 INFO: task kworker/0:671:5712 is blocked on a mutex likely owned by task kworker/0:169:3659. Call trace: r4:82ac11e4 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8474ec00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec321e08 r4:00000000 r7:dddced40 r6:83018000 r5:8573078c r4:84b45d00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c3e74000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 INFO: task kworker/0:673:5716 blocked for more than 479 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec43de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84960dc0 r4:84b45f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r5:8501d38c r4:8501d000 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/0:674:5717 blocked for more than 479 seconds. r10:82918644 r9:ec45dd84 r8:00000002 r7:60000013 r6:ec45dd8c r5:8493d400 r4:8493d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec45de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207040 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec303000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85730b8c r4:85730800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85730b8c r4:84b50f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493d400 r8:84b50fac r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:e04f1dc0 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec69de08 r7:dddced40 r6:83018000 r5:85731b8c r4:8522e000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c4513000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:8501d38c r4:8501d000 Exception stack(0xe04f1fb0 to 0xe04f1ff8) task:kworker/0:676 state:D stack:0 pid:5721 tgid:5721 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85700c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207340 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85700c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec32f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85730f8c r4:85730c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85730f8c r4:8522e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85700c00 r8:8522e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8522e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522e100 r8:8027ed34 r7:ec69de60 r6:8522e180 r5:85700c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85207000 INFO: task kworker/0:676:5721 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c472c000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:5723 blocked for more than 479 seconds. r4:85702400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ade08 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dffc1000 r4:84b66400 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:677:5725 blocked for more than 479 seconds. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207600 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85701800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec349000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573138c r4:85731000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8573138c r4:8522e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85701800 r8:8522e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8522e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522e200 r8:8027ed34 r7:ec69de60 r6:8522e280 r5:85701800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b1fb0 to 0xec6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85207200 INFO: task kworker/0:677:5725 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c48fc000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:678:5727 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:678 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec6b5d84 r8:00000002 r7:60000113 r6:ec6b5d8c r5:85703000 r4:85703000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85703000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85703000 r8:8522e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85207240 task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d20 to 0xe04f1d68) r5:800b0013 r4:80239bd0 r4:e04f1dc0 r4:00000000 r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:679:5730 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:679 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec6a9d84 r8:00000002 r7:60000013 r6:ec6a9d8c r5:85704800 r4:85704800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85704800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6bde08 r9:83018005 r8:85706000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r10:00000000 r9:8522e580 r8:8027ed34 r7:ec6a9e60 r6:8522e600 r5:85706000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852079c0 INFO: task kworker/0:680:5732 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c57c8000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:681 state:D stack:0 pid:5734 tgid:5734 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c5e08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec3b1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/1:619:5736 blocked for more than 479 seconds. r5:847d2400 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d2400 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3e9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cf78c r4:856cf400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cf78c r4:84b67980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d2400 r8:84b679ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b67980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67980 r8:8027ed34 r7:ec695e60 r6:8522e780 r5:847d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c9fb0 to 0xec6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d27c0 INFO: task kworker/1:619:5736 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c5d39000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:682 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85733f8c r4:85733c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/1:620:5739 blocked for more than 479 seconds. r10:82918644 r9:ec6d5d84 r8:00000002 r7:60000013 r6:ec6d5d8c r5:847d3c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d5e08 r4:00000000 r5:856cfb8c r4:856cf800 r10:61c88647 r9:847d3c00 r8:84b67a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b67a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67a00 r8:8027ed34 r7:ec695e60 r6:8522e900 r5:847d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d5fb0 to 0xec6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d2380 INFO: task kworker/1:620:5739 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c64f3000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b66400 r4:00000001 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/0:683:5741 blocked for more than 479 seconds. r10:82918644 r9:ec6d9d84 r8:00000002 r7:60000113 r6:ec6d9d8c r5:847d1800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d9e08 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851b70c0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:82918644 r9:ec5e9d84 r8:00000002 r7:60000013 r6:ec5e9d8c r5:847d6000 r4:847d6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847d6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85283300 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d878c r4:856d8400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d878c r4:84b67a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d6000 r8:84b67aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b67a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67a80 r8:8027ed34 r7:ec695e60 r6:8522ea80 r5:847d6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e9fb0 to 0xec5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85283100 INFO: task kworker/1:621:5746 is blocked on a mutex likely owned by task kworker/0:169:3659. task:kworker/0:169 state:R running task stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c6a33000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.16.0-rc1-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4dac>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec4bf000 r10:61c88647 r9:847d6c00 r8:8522eb2c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b9e000 r8:80200be4 r7:e04f1d54 r6:ffffffff r5:84b9e000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d20 to 0xe04f1d68) 1d20: c6a33000 ed57b000 00000001 80239bb8 7f11f000 00000001 82ac11c4 82ac05a0 1d40: 7f11f000 ed57b000 8280c9b4 e04f1d9c e04f1da0 e04f1d70 80230af4 80239bd0 1d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b70>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48ec>] (__purge_vmap_area_lazy) from [<804e4f28>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d44>] (_vm_unmap_aliases) from [<804e8c9c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9d40 r4:00000000 [<804e8b30>] (vfree) from [<80549e54>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549e24>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501d38c r4:84b66400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9e000 r8:84b6642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b66400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b66400 r8:8027ed34 r7:e04c5e60 r6:84b6be80 r5:84b9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2e00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:5748 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:5748 tgid:5748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ec6d1d84 r8:00000002 r7:60000113 r6:ec6d1d8c r5:85775400 r4:85775400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)